This site hosts a public-facing testbed for a new experimental encryption algorithm. It allows anyone to submit plaintext along with a password (and optionally a digest passphrase) and receive a secure, encoded output in return.
The encryption process runs on a physically isolated, hardened server that performs the transformation in batches and returns the encrypted message. All encryption logic is kept offline to protect the internal design during its early evaluation phase.
This system is designed for black-box testing: you can see how the cipher behaves with chosen inputs, but not the implementation itself. We welcome public feedback, cryptanalysis attempts, and general review of the design assumptions and output characteristics.
Please treat this as an experimental research system, not a production-ready cryptographic tool. The algorithm has not been audited or peer-reviewed, and should not be used to secure sensitive real-world data at this stage.
This site allows you to test a new encryption algorithm by submitting your own plaintext and password. It securely encrypts your message on a separate, hardened server and shows you the encrypted result.
No plaintext is stored permanently. Your message is encrypted and returned as output. Requests older than 7 days are automatically deleted. No analytics, cookies, or user tracking is in use.
The digest password is optional. If provided, it’s used to generate a secure hash of your message for verification or integrity checks. You can leave it blank if you just want simple encryption.
This adjusts the internal encoding complexity (range: 3–10). Higher values increase resistance to some attack types by spreading data across multiple internal chunks — but may increase output size slightly.
The system uses a novel design built from established primitives like Argon2id (key derivation), SHA-256 (digest), and authenticated modes with per-message salt and nonce. The full algorithm is under evaluation and not yet published.
No. This is not a decryption tool or intercept utility. It only encrypts the input you provide, using your own keys. It does not (and cannot) decrypt any 3rd-party data.
You can reply publicly where this was announced (e.g., Reddit, forums), or send feedback privately via email: taggedzi.mpc@gmail.com.
To protect the server from abuse or spam, there’s a limit of 5 submissions every 10 minutes per IP. This keeps the system available and fair for all testers. Please be kind to the encoding server it is over 14 years old.