an in-house made asymmetric supercipher encryption with post-quantum resistance. intended to be used for file encryption. possibly the most powerful open-source encryption to-date.
- CROWNTITANIUM is a novel in-house made asymmertric supercipher with post-quantum resistancy that I made, so I can encrypt highly dangerous malware and post them here on github so nobody can use them.
- CROWNTITANIUM is a supercipher encryption, this means it consists of multiple encryption layers combined. I chose 4 different layers. I will outline them quickly for you.
Let's take a plaintext file for our example scenario.
- AES 256 bit: Plaintext file will be encrypted using AES 256 bit algorithm.
- Generates Public and Private Key used for encrypting and decrypting the file
- CAMELLIA Sub-Supercipher 768 bit: On top of that first encryption layer (AES 256), the file will be encrypted again using a sub-supercipher.
- Another AES 256 bit Layer: First the file will be encrypted again using AES 256 bit algorithm. this extends the composable security of this sub-cipher.
- Generates Public and Private Key for encrypting and decrypting the file
- ChaCha20 256 bit: The encrypted AES 256 bit file will go through another layer of encryption. this time with a ChaCha20 256 bit algorithm.
- Symmetric Key used
- CAMELLIA 256 bit: The final encryption layer of this sub-supercipher uses a strong asymmetric CAMELLIA 256 bit layer.
- Generates Public and Private Key
- Passphrase hashed SHA3-512 The resulting keys of the sub-supercipher will be hashed using SHA3-512
- Another AES 256 bit Layer: First the file will be encrypted again using AES 256 bit algorithm. this extends the composable security of this sub-cipher.
- NTRU Prime (Post-Quantum Resistant): After completing the CAMELLIA sub-supercipher, the file will be encrypted using a quantum-resistant algorithm called NTRU prime. NTRU Prime is known to be very efficient.
- Generates Public and Private Key using KEM
- Kyber-CRYSTAL and dilithium (Post-Quantum Resistant): The last encryption layer is a Kyber-CRYSTAL and dilithium algorithm which is known to be extremely performant.
- Generates Public and Private Key using KEM
- As you see CROWNTITANIUM uses 11 different keys for a complete encryption or decryption of a file. A single file goes through seven different encryption layers until it is fully encrypted.
add support for custom CROWNTITANIUM-over-HTTPS (CoH) and signing support.