Billion Bit Software
This new asymmetric encryption method is experimental and provided for learning, evaluation, and cryptanalysis.
The asymmetry is on the data – the key used to encrypt can be used symmetrically but a decryption key can be derived that can only decrypt.
This means that, regardless of input size (cleartext), the encrypted data itself can be decrypted asymmetrically, in contrast to typical asymmetric algorithms.
No guarantees are made regarding its strength or practical feasibility.
More details about the encryption will be shared over time as I receive public feedback.
Rest assured, there are no hidden tricks—this is not an exercise in “security by obscurity,” nor is it simply generating random output.
There is no temporary or persistent storage of the clear or encrypted text on the server.
Text provided is sent to the server, encrypted, and returned.
I welcome analysis, feedback, and cryptanalysis reports on the results.
If you discover a potential weakness or vulnerability in the encryption, please use the Forum page to report it.