Weedpacket wrote:Sounds like a Catch-22. To decrypt the data you need the key. To get the key you need to decrypt the data.
Besides; if they can get the key from the source code they can get anything else from the source code - including how to get the key from the encrypted data.
nah think outside the box. say your key is 2 chrs in length, what you can do is take you encyrpted data, split it in to 2 parts A and B then rebuild it with your key in...
A + KEY + B,
to get the key you could reverse it. or you could scatter your key. in to single units, this would also disrupt your encryted data on its own being broken unless the key is known and removed from the layout and then processed on its own.
EDIT.
to make it more random i would work on a formula which would count the num of total chrs in the which the encrypted data is, then work on this to split the key in single units and scatter them around in the encrypted data.
Hopefully if the content is different all the time, the keys would be in different locations all the time, vus only the key can be found if
1 your method of storing the key is known,
2 your forumla is known on how you scatter the key.
Remembering without the key the only other way to decrypt data is to break it on its own, but by scattering different content (key) within the encrypted data would stop this, unles again they knew what you was doing and removed these bits first. etc