Text Obfuscation/Encryption

The internet incorporates secure communication methods such as Transport Layer Security (TLS) or a Virtual Private Network (VPN) that provides assurance that the content of communication cannot be easily understood if intercepted.

Plaintext data transmitted by these channels may be protected whilst in transit, but plainly visible at both ends of the channel where it might also be 'stored' in a more easily readable format.

In cryptography, encryption is the process of transforming information (plaintext) using an algorithm (cipher) to make it unreadable to anyone except those possessing specific knowledge of the latter. The result of the encryption process is encrypted information (ciphertext) that should be unreadable by a human or computer without knowledge of the cipher.

The Priory Toolbox includes an obfuscation/encryption capability and you are invited to download the Toolbox from this website.

You might review certain activities that were undertaken to assess the encryption facility that is provided.

There are numerous examples of plaintext and associated ciphertext, generated by our encryption tool that are available for your further review.

The image below illustrates the plaintext taken from the first few lines of Mark Antony's speech in Shakespeare's play Julius Caesar (Act 3, Scene 2) and the ciphertext generated using one (A - Priory Consultants - December 2021) of the multipe ciphers that are included in the Toolbox.

Obfuscation - Friends, Romans, Countrymen
 

Do consider downloading the Toolbox to explore this further and if you are sufficiently interested we would welcome you taking time to complete Registration that would, after you complete site login, allow you to make relevant contributions to related Forums.

In common with many other encryption methods the Toolbox algorithms rely on character related 'seeds' that are used in the transformation of plaintext to ciphertext and vice versa. The Toolbox incorporates the ability for individual users to generate and use their own cipher keys in order to achieve an extremely secure encryption capability that would "protect" text exchange between them and any other party they might choose to share their cipher keys with.

Contact Us   Privacy Policy   Site Terms and Conditions   Site Copyright    Localhost PHP Info

This web site uses cookies to improve your experience and by viewing our content, you are accepting the use of cookies.
Cookies are small text documents stored on your computer; the cookies set by this website can only be used on this website and pose no security risk.
Please do not proceed if you do not want these cookies being set. Review our privacy policy and site terms and conditions for further explanation.
This site is generated using CodeIgniter - page rendered in 0.0602 seconds

Copyright Authors © 2021. All Rights Reserved.