Encrypting Files, Messages, Media
Secure Encryption with Cipher
Cipher enables the secure encryption of any form of digital content — including text, documents, audio, and video — via a decentralized, fully client-side protocol. This section outlines the operational prerequisites and usage limits.
Prerequisites
To encrypt or decrypt data using Cipher, the user must first:
Create or import a valid structured channel, following Cipher’s syntactic rules (see [Cipher Channels Explained]).
Generate or import a valid key pair:
The private key is used as the password (kept secret).
The public key serves as the user identifier.
Obtain the public key of the recipient, which will be used as the destination ID.
Once these are in place, the user can initiate encryption or decryption flows entirely locally, without any server or metadata overhead.
Usage Modes
Short message or text-based communication can be encrypted and the output copied and pasted directly into any communication platform. The recipient simply needs to paste the ciphertext into their Cipher instance using their own private and public key, along with the agreed channel.
Longer messages and all files (documents, audio, video) should use the export mechanism. Cipher provides a
.0fx
export format that packages the encrypted content into a transferable file. This file can then be sent via any platform and decrypted by the recipient who uses the matching configuration.
Technical Limits
Processing capacity is hardware-dependent. Indicative file-size limits on standard mobile devices, assuming a 10 Mbps processing threshold:
Text / Documents: Approximately 10 MB — roughly equivalent to a PDF of up to 1,000 pages.
Audio (MP3): Up to ≈ 3 minutes (~3 MB per minute; ~9 MB total).
Video (mobile camera): Up to ≈ 15 seconds (~10 MB file size, depending on resolution).
These are approximate values and may vary significantly depending on the device's CPU, memory, and file encoding settings. All encryption and decryption utilize only local device resources.
Summary Workflow
User encrypts content using:
Their private key
Their public key
The recipient’s public key
A shared structured channel
Cipher outputs either:
A short ciphertext (for copy–paste), or
A
.0fx
encrypted file
Recipient decrypts using:
Their private key
Their public key
Sender's public key
The same shared channel
All encryption and decryption occur entirely on the user's device, ensuring total privacy, control, and no external dependency.
Last updated