VMPC is an independent algorithm designed by
Bartosz Zoltak,
is derived from scientific research and is not supported by any government agency or corporation.
The today's standard AES algorithm is supported by the
National Security Agency, USA
The answer to the question which algorithm it to trust - the independent one or
the one supported by the government agency is up to you.
VMPC is a comprehensive technology. It has an individually designed key management procedure
(KSA - Key Scheduling Algorithm) and an individually designed authenticated encryption scheme (MAC Message Authentication Code).
The AES algorithm on the contrary does not have an individually designed key management procedure
and it does not have an individually designed authenticated encryption scheme are required.
In each implementation of AES different algorithms can be used for this purpose)
Using wrong algorithms can lead to a drastic loss of security.
For example still many applications use the AES algorithm in the ECB mode.
This is a very serious mistake causing great threat to the encrypted data. Such applications should be avoided.
Assessment which technology it is better to use - designed comprehensively
or a combination of different algorithms - is also up to you.
The original FSE'04 conference paper about VMPC technology "VMPC One-Way Function and Stream Cipher" can be downloaded here:
The foundation of the VMPC technology. Probably the simplest one-way function known in the world to date.
We are running a
research project
attempting to prove the function's one-wayness.
If successful, it would provide breakthrough results for cryptography and theoretical computer science
because it would settle the famous P vs NP problem.
Clay Mathematics Institute,
USA, founded a million dollar prize for solving it.
The core of encryption technology employed in the VMPCrypt application. A very
efficient and secure stream cipher with a dedicated key scheduling algorithm. Built as an
extension of the VMPC one-way function.
A unique algorithm allowing to derive an additional layer of cryptographic security
from the Key Scheduling Algorithm. Data encrypted using this algorithm remain secure
even if the underlying cipher is broken.
Employed in the VMPCrypt application.