Very interesting, thanks.
Have people who know more (than me) about security/cryptography taken a look at this, to try to poke holes in it?