Questions tagged [pen-and-paper]

The term "pen and paper" can practically be interpreted as "using no tools like electronic devices", since it targets cryptographic functions, schemes, and procedures which can be handled by humans who have nothing more available than the option to use manual writing. So, "pen and paper" can also mean "pencil and post-it", "chalkboard and chalk", "wall and spraycan", etc. Mental calculations and reasoning processes are also included.

The term "pen and paper" refers to cryptographic functions, schemes, and procedures that can be handled by humans, without access to computers or other electronic equipment. So, "pen and paper" can also mean "pencil and post-it", "chalkboard and chalk", "wall and spraycan", etc. Purely mental schemes are less common but would require similar complexity and techniques, so they are included for practical reasons.

To explain it a bit more practically: the term "pen and paper" originates in military cryptography, where soldiers in the field can frequently find themselves in situations where they need to apply cryptography to transport messages in a secure way, but have nothing but a pencil and some paper available to do so.

On the Cryptography stackexchange, the more specific tag applies to cryptography that historically existed before computers, while the more general "pen-and-paper" tag also applies to recently-created cryptography.

The related tag can be seen as covering cryptographic systems intended to run on slow, low-memory smartcards and other constrained systems, rather than general-purpose computers.

70 questions
50
votes
8 answers

Is there a simple hash function that one can compute without a computer?

I am looking for a hash function that is computable by hand (in reasonable time). The function should be at least a little bit secure: There should be no trivial way to find a collision (by hand). For instance, a simple cross-sum is not meeting this…
FUZxxl
  • 603
  • 1
  • 5
  • 13
46
votes
5 answers

Is there a secure cryptosystem that can be performed mentally?

I, myself, do not plan on getting into a situation where I would be unable to use a computer in order to communicate securely. However, I can think of many practical situations in which mental cryptography would be useful. Is there a secure…
John Gietzen
  • 1,515
  • 2
  • 15
  • 16
34
votes
3 answers

Possible ways to crack simple hand ciphers?

We had a quiz in class today where we had to break the ciphertext with the key given, but not the algorithm. Suffice to say that I wasn't able to decrypt it within the allotted time of 12 mins and will probably get a 0% score on the quiz. So, I was…
24
votes
7 answers

What is the most secure hand cipher?

By "hand cipher", I mean a symmetric cipher for which encryption and decryption can can both be performed with a pencil on graph paper, consuming about 10-20 seconds per character by a proficient user. Additional simple tools, e.g. a deck of cards…
Jordan
  • 595
  • 1
  • 4
  • 9
22
votes
6 answers

Are there cryptographic hash functions that can be computed using only paper and pen without leaking any information about the plaintext?

I am looking for a cryptographic hash function that can be computed by a human using only paper and pen without ever leaking any information about the plaintext on the paper. The cryptographic hash function should be computable by an algorithm…
Vincent Yu
  • 392
  • 4
  • 12
16
votes
4 answers

Is there any strong enough pen-and-paper or mind cipher?

Some ciphers are talked about at “Is there a secure cryptosystem that can be performed mentally?”, but (at the time of writing) I don't see an answer. Are they strong enough, or are non-computer ciphers more or less just a toy and one should…
Smit Johnth
  • 1,731
  • 4
  • 18
  • 27
11
votes
0 answers

Is there a pen-and-paper way to securely share a secret via public key encryption?

We have several questions tagged pen-and-paper talking about encryption, hashing, signing, etc. but no question asks about exchanging a secret via public key encryption in a secure way. Does any solution exist, which would allow us to exchange a…
Mike Edward Moras
  • 18,161
  • 12
  • 87
  • 240
10
votes
8 answers

Does humanly verifiable one time pad authentication exist?

Firstly some predicates:- Sufficient hardware generated one time pad key material. No pad reuse. Messages of 160 characters length (think Twitter). 28 characters only in use (A-Z, space and full stop alphabet. Think Morse). The very vast majority…
Paul Uszak
  • 15,905
  • 2
  • 32
  • 83
10
votes
1 answer

How would you encrypt-then-MAC when using pen-and-paper and a Caesar cipher?

I'll probably get shot for asking this, but I've got some kids (aged 8-10) in my neighbourhood that I've been showing/teaching the simple pen-and-paper Caesar cipher and they're successfully playing with it for more than a week now. Silly me thought…
Mike Edward Moras
  • 18,161
  • 12
  • 87
  • 240
9
votes
1 answer

Simple digital signature example that one could compute without a computer?

I am working on a document to explain Bitcoin to students. But I am having a hard time translating the principle described in §2 of the Bitcoin whitepaper in layman's terms. There is a great question (Is there a simple hash function that one can…
9
votes
1 answer

How hard is the Solitaire cipher to crack?

Assuming your deck is completely random and that it is not retrivable, how hard would it be for a casual person to decrypt a message encrypted with the Solitaire cipher?
John Doe
  • 93
  • 1
  • 3
8
votes
3 answers

Pen-and-paper one-way function for externally-anonymous survey

When conducting surveys, an Administrator might send an Enumerator to survey a Respondent. For "sensitive" questions (e.g. about embarrassing behavior), the Respondent may be fine with the truth being revealed to the Administrator but not to the…
8
votes
2 answers

Toy hash algorithm that can be broken

I'm looking for a toy hash function, where the idea is to have high school students break (i.e. find a collision) a hash function by hand, in order to teach them how one way functions and hashing works. Do you happen to know some function like…
AndresQ
  • 235
  • 1
  • 6
8
votes
4 answers

Would RSA make sense if we used no computers?

I was recently wondering - would RSA be useful if we brought it to, say, medieval times? Could you choose the keys so that you could encrypt/decrypt messages quite easily, but factoring the private key would, say, take over 1000 days for 1000…
d33tah
  • 363
  • 1
  • 15
7
votes
3 answers

Manual secret sharing?

What are feasible options for an equivalent of Shamir Secret Sharing using small tables, preferably usable with pen-and-paper? We want to share a secret $K$ into $n\ge2$ shares, so that $m$ shares ($2\le m\le n$) are necessary to reconstruct the…
fgrieu
  • 149,326
  • 13
  • 324
  • 622
1
2 3 4 5