Encryption and decryption sites are initially assigned identical one time
Vernam like pads, (OTP), and each site is provided with identical
compendiums of byte modifying instructions identified by instruction IDs.
Encryption is implemented by a random first subset of instructions
applied to the current OTP to generate a new OTP. A second subset of
random instructions is applied to the message for encryption. The list of
IDs of the first subset of instructions is XORed with the current OTP.
The list of IDs of the second subset of instructions and the encrypted
message are each XORed with the new OTP and all XORed outputs are
concatenated into the payload. Decryption is implemented by applying the
encryption steps to the payload in reverse order to recover the message
and new OTP. A secure, new OTP is therefore available both at the
encryption and decryption sites without having been transmitted.