🔐 About This Project

This site hosts a public-facing testbed for a new experimental encryption algorithm. It allows anyone to submit plaintext along with a password (and optionally a digest passphrase) and receive a secure, encoded output in return.

The encryption process runs on a physically isolated, hardened server that performs the transformation in batches and returns the encrypted message. All encryption logic is kept offline to protect the internal design during its early evaluation phase.

This system is designed for black-box testing: you can see how the cipher behaves with chosen inputs, but not the implementation itself. We welcome public feedback, cryptanalysis attempts, and general review of the design assumptions and output characteristics.

Please treat this as an experimental research system, not a production-ready cryptographic tool. The algorithm has not been audited or peer-reviewed, and should not be used to secure sensitive real-world data at this stage.

Frequently Asked Questions

🔐 What does this site do?

This site allows you to test a new encryption algorithm by submitting your own plaintext and password. It securely encrypts your message on a separate, hardened server and shows you the encrypted result.

❓ Is my input safe? Are you storing my data?

No plaintext is stored permanently. Your message is encrypted and returned as output. Requests older than 7 days are automatically deleted. No analytics, cookies, or user tracking is in use.

🗝️ What is the “digest passphrase” and is it required?

The digest password is optional. If provided, it’s used to generate a secure hash of your message for verification or integrity checks. You can leave it blank if you just want simple encryption.

🔁 What does the “redundancy” setting do?

This adjusts the internal encoding complexity (range: 3–10). Higher values increase resistance to some attack types by spreading data across multiple internal chunks — but may increase output size slightly.

⚙️ What kind of encryption is used?

The system uses a novel design built from established primitives like Argon2id (key derivation), SHA-256 (digest), and authenticated modes with per-message salt and nonce. The full algorithm is under evaluation and not yet published.

🕵️ Can I use this to decrypt other traffic or files?

No. This is not a decryption tool or intercept utility. It only encrypts the input you provide, using your own keys. It does not (and cannot) decrypt any 3rd-party data.

📬 Where can I report bugs or give feedback?

You can reply publicly where this was announced (e.g., Reddit, forums), or send feedback privately via email: taggedzi.mpc@gmail.com.

📉 Why is there a limit on how many times I can submit?

To protect the server from abuse or spam, there’s a limit of 5 submissions every 10 minutes per IP. This keeps the system available and fair for all testers. Please be kind to the encoding server it is over 14 years old.

← Back to the submission form