Skip to main content

All Questions

1vote
1answer
6kviews

Which algorithm is safest if we exclude AES, Twofish, Serpent and Whirpool?

TLDR: Which algorithm is safest if we exclude AES, Twofish, Serpent and Whirpool? My threat model is archiving and backing up important and private files. Files will be stored in many places ...
asdfasdf's user avatar
3votes
0answers
197views

Can I make a digital time capsule? [closed]

Say I wanted to make a super awesome time capsule of some digital information. How would I encrypt it so that no one would be able to open it until a specified date? (E.g. 100 years from now.) At ...
Sauce McBoss's user avatar
2votes
1answer
356views

How does encryption strength make a difference to an attacker

Take for example I have my social security and other personal information stored as a string that I am trying to encrypt on my local drive. My first method of encrypting the string is to use a ...
void.massive's user avatar

close