Comment by keepamovin

4 months ago

It seems insufficiently secure to just trust that the people who designed the ciphers you use, and who also are responsible for breaking ciphers at state-level, would tell you if they could break those ciphers. Hahaha :)

Ok so you have no idea who's vetting the algorithms at competitions. It's the other participants. That's going to be you among others. You get to break apart all the competing algorithms that claim to be better than yours. And they get to show you if yours is the weaker one, as they also want to win the competition.

Sure, you can't put fox to guard the henhouse that's how you get stuff like DUAL_EC. But that's not the case in modern competitions. They are open to the public, and academic in nature. Everyone gets to analyze them.

We don't know who you are, what are your credentials, and we don't have any proof of you showing you have what it takes to analyze current standards, let alone create new primitives resistant to cryptanalysis. Until you decide go the long way, you'll find yourself treated as yet another Crown Sterling.

  • > It's the other participants.

    Even better, it's the general public. Anyone who wants to can publish an analysis at any time, even after the competition ends. If someone published a practical attack against SHA-3 tomorrow the recommended standards would change overnight.