Comment Re:Security through obscurity (Score 1) 106
Which is how we end up with things like the weak Zip File and early MS-Office encryption. Companies think they can roll their own, or take shortcuts and end up with weak security. Published algorithms have withstood scrutiny by actual experts, don't assume that your home-grown super-secret encryption will stand up to scrutiny
Funny you mentioning Zip and Office encryption. Neither of those ciphers is broken. If you read the papers you are linking to you'll find that the zip attack exploits its byte-by-byte CBC mode. With only a byte, dependencies between sequential bytes can be put into a solvable matrix. Expanding the block to even 4 bytes would make this attack infeasible. Office encryption break likewise exploits the CBC weakness, due to Office reusing IVs. The cipher, RC4, happens to be one of your published algorithms. This just illustrates that the cipher is only one part of any cryptosystem, and the way you use it also matters. If you know enough to make your blocks large enough, like 16 bytes, and are aware that IVs need to be unique, there is no reason you couldn't design your own secure cipher. Cryptographers are not supergeniuses. All it takes is some attention to detail.