Encryption Services

Introduction

The purpose of this website is experimental with the intention of exploring different ways of securing and authenticating communications.

Schemes

Encrypt/Decrypt text using symmetric cipher. This may be used for nested encryption within online email. Keys to use may be conveniently stored and selected from cookies or files. The page uses client side javascript, so once page is fetched it can be run repeatedly on the client computer browser even when disconnected from the internet.

COMN Sense combines two or three key parts to form a complete key, and uses these to encrypt or decrypt a given text. Each of these key parts could be a series of keys really that are applied iteratively. Encryption may be applied to an entire text or just selected sections of keywords or sentences, each surrounded by special open and close tags.

Convert words or pass-phrases into garbled text equivalents, by passing these words into a hash function, along with an optional long parameter string that may be a constant.

Sigauth uses symmetric functions to generate an authenticating stream of numbers that can be used to identify a signal source with gradually increasing confidence.