Visual Guide to Understanding the Encryption Process
Two-Layer Security: Character substitution + optional master key encryption
Unicode Support: Any character can be encrypted using hex encoding
Salt-Based: Each encryption uses a unique random salt for enhanced security
Each character in the input is replaced with a unique 2-symbol combination using these 8 special characters: ./_-+=!~
Category | Characters | Example Mapping | Pattern |
---|---|---|---|
Lowercase | a-z | a → ./ | Uses . / _ - symbols |
Uppercase | A-Z | A → -! | Uses - + = ! ~ symbols |
Numbers | 0-9 | 0 → ~- | Uses ~ and doubles |
Common | Space, punctuation | Space → == | Special patterns |
Unicode | Any other character | € → [U20AC] | Hex encoding fallback |
Character Substitution Alone: Provides obfuscation but is not cryptographically secure. The mapping can be reverse-engineered through frequency analysis.
With Master Key: Significantly more secure due to PBKDF2 key derivation and XOR encryption, but still should be combined with established encryption standards for highly sensitive data.
Enter text below to see how each step of the encryption process works:
The demo shows each character being mapped to its encrypted equivalent, demonstrating the core substitution cipher. In a real implementation with a master key, additional encryption layers would be applied.