Paper & Pencil Methods

Page #43534 of Chapter: Crypto-for-the-rest-of-us

level indicator

****

These methods may be extremely personal, designed to withstand casual attacks only, and may operate without a key

These methods should be easy enough to compute without a computer, and apply on notebooks, scrap paper, and other personal sheets designed for very personal use, but which may be lost, stolen or misplaced.

By combining paper & pencil methods one can put together a very obscure, and rather powerful crypto algorithm.

Check this article: Can a Paper and Pencil Cipher Compete with AES and the Like?.

Paper & Pencil Cryptography -- Slide Show.

* Version CE-H6703 (SERVER) Crypto Academy