1
submitted 1 week ago* (last edited 1 week ago) by hereforawhile@lemmy.ml to c/SecureComs@lemmy.ml

Broad Guide to Bootstrapping your own Codebook

Using a few key formulas you can create a functional code book with enormous keys that no computer could possibly brute force.

First let me explain how many possible keys there are in this particular example.

In this example the word list contains 3000 words. Each subsequent column labeled k1-k9 contains another 3000 bits of unique information. Each number of key columns added exponentially increases the total key possibilities.

In this schema the "Key" to encrypt and decrypt is the unique state of each cell in relation to the word list.

3000!^10 represents the amount of possibilities.

That is 2^91312 possible keys which makes aes 2^256 look completely wimpy.

Important Functions To Master To Build your Code Book

  • randbetween()

-vlookup()

-ifs()

-concatenate()

All of these formulas can help automate the encode/decode process.

Ways to mitigate Frequency Analysis

-Layer the final ciphertext with other string encryption protocols.

-Increase the amount of key columns so that the encoding formula can pick a random column. This will allow the same word to be encoded multiple ways so that someone analyzing plaintext will hit a wall.

-Generate new keys. New keys can be generated by shuffling the key and wordlist columns. You can use sorting functions to randomize and shuffle the wordlist.

Ideal Operational Security

-Air gap the computers running the encoding/decoding processes

-Share the keyfiles offline

-Rotate keys often

-Destroying old keys

-Use already secured communication channels to add layers.

Final Notes

This is obviously not a convenient way to share a message. It requires dedicated hardware, and disciplined protection of the keyfiles to really be secure.

Regardless of what anyone tells you about the strength of modern encryption ciphers like AES256...do you really think a the most powerful nation in the world would release a unbreakable encryption protocol 15 days after 9/11? I don't think so pal

top 6 comments
sorted by: hot top controversial new old
[-] hereforawhile@lemmy.ml 1 points 4 days ago

Thinking more about this today and reasons why it's going to be pretty un-penatrable.

It's like if Alice and Bob got in a room and generated an entire new language that only they understood...except you can generate a new language in an instant. Kinda nuts!

[-] hereforawhile@lemmy.ml 1 points 5 days ago

132444 83713 59935 115996 141476 66631 99338 22513 145201 133363 125022 45199 34090 149529 44724 176732 83212 5182 92457 60368 86990 33679

[-] hereforawhile@lemmy.ml 1 points 4 days ago

41521 134460 145169 157637 59697 167715 690 177327 170354 176122 27851 117853 125171 104058 148640 42611 108608 26700 165748 180951 129127 120819 13849

[-] eldavi@lemmy.ml 0 points 1 week ago

This is obviously not a convenient way to share a message. It requires dedicated hardware, and disciplined protection of the keyfiles to really be secure.

Regardless of what anyone tells you about the strength of modern encryption ciphers like AES256…do you really think a the most powerful nation in the world would release a unbreakable encryption protocol 15 days after 9/11? I don’t think so pal

people won't do 30 second google searches to dispel US propaganda and i wonder how long you can keep a system air-gapped since they will always need updates.

[-] hereforawhile@lemmy.ml 1 points 1 week ago

The attack vectors are pretty limited for an airgaped device right? I don't think installing a security update would really be needed in this schema.

[-] eldavi@lemmy.ml 1 points 4 days ago

This is how a lot of places run; on old msdos/win95 systems that are accidentally airgapped

this post was submitted on 09 Oct 2025
1 points (100.0% liked)

Secure Coms

45 readers
1 users here now

This is a community for enthusiest who love to ponder new ways for Alice to communicate with Bob in a world where global passive adversarys probably record every bit that ever crosses the wire.

Discuss cryptography, secure key exchange, private messangers, radios, encoding, networking tools, authentication mechanisms and anything relevant to coming up for ways to Alice to get a message to Bob.

founded 1 week ago
MODERATORS