If as you propose you idea is come sort of new crypto algorithm,
it isn't really much of a business idea anyway. Secure crypto tends to require a lot of peer review to advance and there's little to no money patenting it because the quality of public domain crypto is excellent. Whether you intend to scam or not I doubt there is much appetite to finance your effort, because the best outcome is probably going to be you develop your algorithm and default on the loan because you have produced a product without a market.
Without regard for what else you have posted: soliciting for a long term low detail loan without at least building up some reputation on WOT or through other transactions makes it hard to take you seriously.
Out of a whole list of what I need the Bitcoins for, you have selected the item through which I obviously do not intend to return the loan.
Peer review is what happens after patenting. Patenting takes up to 18 months at the patent office (i.e. country) you apply. Claiming the same patent in additional countries after establishing priority at the first patent office takes additional time. An invention can only be patented if it has not been made public prior to being provided with the patent for the invention. This is the up-to-18-months period. Also note that I only speak and write Croatian and English; the Swiss Institute for Intellectual Property allows patent applications to be submitted in English to establish priority; however, the applicant must provide a German, French, or Italian translation within 3 months. I expect no profit from the invention within the first few years of patenting as – as you have correctly noted – such an invention needs to be peer reviewed, first and then – additionally – it has to be applied into existing or new products. I intend to allow free non-commercial use with Free and Open Source (FOSS) Linux, Berkley Systems Design (BSD), GNU/Hurd etc. distributions.
Let me – again – copy-paste my brief explanation of the purpose of the loan:
The projects are from the area of Information Technology (IT) security exploitation and prevention, advanced computer networking and stealth and/or steganographic routing, cryptography and cryptology, Communications Intelligence (COMINT) and Signals Intelligence (SIGINT) gathering and evasion, emanations security (EMSEC) exploitation (TEMPEST) and prevention (alternatives to NATO SDIP-27), and similar projects.
If you need a direct answer to the question "What will you repay the loan from?", the answer is: I will first finish the smallest and simplest projects for almost-only-financial purposes. Then I will have the financial means to develop the mostly-novel projects which I really want to create and then the truly-novel projects. It need not necessarily go in that sequence, but what is truly-novel usually cannot be applied soon – i.e. there is no direct demand for it before it is created – so one cannot expect immediate profit from the truly-novel, but only from the mostly-novel.