I know theres AES and PGP, but all electronics stuff still has backdoors. You can’t backdoor a piece of paper and a writing utensil.

    • heavydust@sh.itjust.works
      link
      fedilink
      arrow-up
      22
      ·
      19 hours ago

      It’s a good algorithm but if you need to decode any message, you must get drunk and listen to creepy radio stations at 1AM in the forest or something.

    • ERROR: Earth.exe has crashed@lemmy.dbzer0.comOP
      link
      fedilink
      English
      arrow-up
      14
      arrow-down
      2
      ·
      19 hours ago

      Hmm yea cool, problem is, its not reusable. You have to generate new keys every time. Kinda not easy to constantly exchange new keys if you are… say a group of revolutionaries hiding from the government. 👀

      • Rowan Thorpe@lemmy.ml
        link
        fedilink
        arrow-up
        5
        ·
        12 hours ago

        In-band periodic key-exchange. Pre-arrange that keys expire every X messages, and that the last (Xth) message is dedicated to sending the new key encrypted by the previous one.

      • yoevli@lemmy.world
        link
        fedilink
        English
        arrow-up
        27
        ·
        edit-2
        19 hours ago

        This is how all modern cryptography works. A deterministic cipher is functionally no different from pig Latin when it comes to actual security. An electronic solution like public key cryptography is infinitely more secure. If you’re especially paranoid you can generate the cryptotext locally and send it by email; that would be much safer than anything you could achieve by hand.

        • otacon239@lemmy.world
          link
          fedilink
          arrow-up
          6
          ·
          17 hours ago

          I would think mailing a flash drive with the key and sending the message electronically would be safer. One requires knowledge of the other.

        • ERROR: Earth.exe has crashed@lemmy.dbzer0.comOP
          link
          fedilink
          English
          arrow-up
          4
          ·
          edit-2
          19 hours ago

          Hmm okay I was actually thinking of using this for journaling… so keeping a stack of OTP codes right next to my journal isn’t quite useful…

          gotta keep my evil plans for world domination a secret… MUAHAHAHAHA 😈

          • SmoothOperator@lemmy.world
            link
            fedilink
            arrow-up
            2
            ·
            9 hours ago

            Hmm, you’re probably going to get a lot of answers assuming you wanted to do secure communication, not secure journaling. Different beasts I would think.

      • m0darn@lemmy.ca
        link
        fedilink
        arrow-up
        6
        ·
        19 hours ago

        I’m certainly not an expert.

        But could you generate pads from mutually accessible data sources?

        Like use hit_me_baby_one_more_time_not_a_virus.mp3 appended with a password, as a seed in a pseudo random number generating algorithm, then do the same thing with another data source, repeat however many times, then XOR the generated numbers together, and use the result as a pad?

        • ricecake@sh.itjust.works
          link
          fedilink
          arrow-up
          6
          ·
          18 hours ago

          That’s no longer a one time pad. That’s closer to a homebrew stream cipher with the weakness of having a key that you just hope no one notices.

          • m0darn@lemmy.ca
            link
            fedilink
            arrow-up
            1
            ·
            5 hours ago

            Neat, yeah Wikipedia says steam cipher approximate one time pads but can also be completely insecure.

            I think it would take one hell of an effort to crack, it would be like 3MB encryption right? Or if they guessed the scheme they could try all mp3s ever torrented XOR’ed in every possible combination.

            Idk I think there’s something workable there but I only having a casual knowledge

            Also I think OP wanted pen and paper so maybe use a book instead digital files.