This is how all modern cryptography works. A deterministic cipher is functionally no different from pig Latin when it comes to actual security. A modern solution like public key cryptography is infinitely more secure. If you’re especially paranoid you can generate the cryptotext locally and send it by email; that would be infinitely more secure than anything you could achieve by hand.
Hmm yea cool, problem is, its not reusable. You have to generate new keys every time. Kinda not easy to constantly exchange new keys if you are… say a group of revolutionaries hiding from the government. 👀
yoevli@lemmy.world 10 hours ago
otacon239@lemmy.world 8 hours ago
I would think mailing a flash drive with the key and sending the message electronically would be safer. One requires knowledge of the other.
Nemo@slrpnk.net 10 hours ago
That’s why you make a stack of them. Generate hundreds up-front and you don’t need to generate new every time.
IDKWhatUsernametoPutHereLolol@lemmy.dbzer0.com 10 hours ago
Hmm okay I was actually thinking of using this for journaling… so keeping a stack of OTP codes right next to my journal isn’y quite useful…
gotta keep my evil plans for world domination a secret… MUAHAHAHAHA 😈
SmoothOperator@lemmy.world 50 minutes ago
Hmm, you’re probably going to get a lot of answers assuming you wanted to do secure communication, not secure journaling. Different beasts I would think.
m0darn@lemmy.ca 10 hours ago
I’m certainly not an expert.
But could you generate pads from mutually accessible data sources?
Like use hit_me_baby_one_more_time_not_a_virus.mp3 appended with a password, as a seed in a pseudo random number generating algorithm, then do the same thing with another data source, repeat however many times, then XOR the generated numbers together, and use the result as a pad?
pageflight@lemmy.world 9 hours ago
Steganography may be interesting in that vein. Hiding data within larger images / sound files etc.
ricecake@sh.itjust.works 9 hours ago
That’s no longer a one time pad. That’s closer to a homebrew stream cipher with the weakness of having a key that you just hope no one notices.
rowanthorpe@lemmy.ml 3 hours ago
In-band periodic key-exchange. Pre-arrange that keys expire every X messages, and that the last (Xth) message is dedicated to sending the new key encrypted by the previous one.