There are a few fundamentals of practical cryptography:
(1) You probably will never create an algorithm or a system better than one you can grab off the shelf:
"Civilian-grade encipherment" is recognized to be very important, even by the "spook" agencies. A great deal of effort is constantly being made to create
strong algorithms, and
trustworthy infrastructure surrounding those algorithms. These systems protect terabytes or petabytes of information
every day.
(2) There is no "security through obscurity."
No one will pay the slightest bit of attention to any algorithm that its creator will not
fully reveal. A fundamental of cryptography is that Eve knows
everything about the entire system that Alice and Bob are using, except for
one thing: "the key." Eve has a copy of the source code, and in fact it
is "the correct source code."
(3) A "break" must be usefully and consistently exploitable, to be called a "break":
It's not good enough that Eve is able to brute-force a single message given sufficient aeons. (That's called a
"theoretical break.") What Eve needs is a
practical break: something that allows her to defeat the cryptographic protection easily enough, quickly enough, and consistently enough to be a serious threat.
(4) Forget "one-time pads!":
If you possessed the perfectly-secure means to share a one-time pad between Alice and Bob, why not use those means to simply share the message itself?
But also: it is impossible to detect that a one-time pad might have been somehow
stolen. If Eve somehow did possess a copy of it, Eve could use it to forge messages or, if she could be a (wo)man in the middle, to tamper with the messages ... undetected and undetectable.
A practical cryptosystem must provide
three protections:
- That the message is concealed. (Of course ... although this step is actually optional! Maybe you only want to vouch for the message, and it is unnecessary to conceal it.)
- That the message as-received is identical to the message as-sent.
- That the message actually did come from its purported sender.
The many strong civilian systems that you can have in your hot little hands at
no cost, all are able to do all of these things.