22.03.2015, 01:44
I know that substitution boxes allow you to alter the linearity of the encryption's structure (Not sure if that's the right way to word it, since the courses I took were in french). To make it simple, they are the reason why some of the hashes of strings with different lengths have the same length. Anyways, I use my own registration system because I couldn't find other systems that are much different of what I do. Almost all of the systems that I found so far simply use the whirlpool plugin.
I just re-read your post again and I didn't say that I am making my own hashing algorithme. I don't think that I am good enough for that. But what I mean is: for example I do the salting and everything and I get my final hashed password. I would do a basic encryption of that hash for instance make a = c, d = g etc... (Just a simple example).
I don't see why that would be a bad idea because if they try to brute force it for example they will get a wrong string.
Doing the encryption before the hashing should also work and even if a hacker breaks the hash he will need to decrypt the output and only I will know the key which makes his job slightly harder but of course not impossible. My point is, I don't see why it would hurt to do that and this what I am trying to explain and I think you misinterpreted it into making my own hashing algorithme.
I just re-read your post again and I didn't say that I am making my own hashing algorithme. I don't think that I am good enough for that. But what I mean is: for example I do the salting and everything and I get my final hashed password. I would do a basic encryption of that hash for instance make a = c, d = g etc... (Just a simple example).
I don't see why that would be a bad idea because if they try to brute force it for example they will get a wrong string.
Doing the encryption before the hashing should also work and even if a hacker breaks the hash he will need to decrypt the output and only I will know the key which makes his job slightly harder but of course not impossible. My point is, I don't see why it would hurt to do that and this what I am trying to explain and I think you misinterpreted it into making my own hashing algorithme.

