There are no specific rules to develop a good protocol, other than achieving the 3 stated goals above. The example protocol shown below would work for a group of close friends who know the names of each other's pets. It has 3 components:
The Core is the phrase (or string of characters) from which a variety of keyphrases will be generated. It should be unique and memorable to the members of group. Maybe it is an inside joke or a made-up phrase that is obvious to the group but obscure to outsiders. Make sure that the core does NOT include any information that identifies any individual in the group.
The above Core is both memorable and unique — it alters a well-known saying with two rhyming web browser-inspired terms.
The Generator, by altering the Core phrase, generates all the actual keyphrases you'll use when communicating with your group. The Generator defines an element or set of elements that alter the Core, based on external changing factors. Members of the group would use these variable keyphrases to encrypt and decrypt individual messages.
This Generator would produce a variety of keyphrases, such as...
Anyone in the group receiving an encrypted message would be able to figure out the keyphrase by simply checking when it was sent (September), and remembering the name of the sender's pet (Mr. Jinx).
The Pivot is a pre-determined instruction triggered by a signal from the message sender. Depending on the Pivot's level of complexity, it can generate either...
This Pivot produces a variety of keyphrases, such as:
Say there are 6 people (and thus 6 pets) in the group sharing this protocol...
That's 114 different keyphrases this single protocol could generate. That's pretty powerful, and it was not complicated at all. All it took was defining 3 components:
Back to Tips & Tutorials | Next: Learn How to Safely SHARE a Keyphrase Protocol.