listen to this article:

Do you happen to have a crypto algorithm you’d like to introduce? Then get ready to do a thorough security proof; just because you can’t break it, doesn’t mean it’s secure. Prof. Nigel Smart discusses the process of introducing a cryptographic algorithm, what applications MPC (multiparty computation) is used for and gives a clear-cut answer to whether we can bioengineer public-key cryptography into human voice.