Trying to understand creating my own file encryption program

I’m making the assumption the person cracking the code does not know the algorithm that was used to encrypt.

Are you thinking that, due to computing power, a brute force method could be used? If you don’t know the algorithm, how might a brute force method work in this case?

I dunno; I think I would say that the OP’s scheme is more secure than ROT-26. In fact, I’d even go so far as to say that it’s more secure than ROT-13.

This reminds me of the Solitaire Cipher.

For everyone’s information, this is simply a learning exercise. I have no intention of trying to hide important information with this.

Thanks again for replying to my thread. I will check out more information on some of the links/buzzwords thrown out/books.

A lot of cracking algorithms look for patterns in the encrypted message that occur more (or less) often than would occur if the message was completely random. Modern techniques need only a very small pattern to crack the whole message. Compressing a message first (e.g. zipping it) will help reduce most of the redundancy in the message but it has the flaw that the first few bytes of every compressed message will contain similar information (information needed to uncompress the data) and can itself be exploited.

If you’re interested in a real-world scenario of what you’re talking about check out the cracking of the Enigma machine during WW II.

Heh.