Keyshanc Real-Time, or KeyshancRT, improves upon the original Keyshanc algorithm by recomputing the shuffle every minute using a Time-Based One-Time Pad (TOTP).
A demo of KeyshancRT can be found here.
This change significantly reduces Keyshanc's main vulnerability: frequency analysis. It is much harder to conduct frequency analysis because an opponent will only have a minute's worth of ciphertext to analyze (the success rate of frequency analysis depends on the amount of ciphertext available). Additionally, should an opponent successfully analyze any given minute, this will not aid the opponent in decrypting any other minute's worth of ciphertext. Frequency analysis must be conducted for each minute.
Assuming that frequency analysis is no longer worth the opponent's time/effort, then the strength of KeyshancRT hinges on the complexity of the shared password. An opponent will always be able to conduct a brute force attack against the shared password, so choosing a good password is critical.
The core Keyshanc function remains unchanged. The added steps for encryption are:
Decryption uses similar steps as above, except that the timestamp of the message is used as the basis for the TOTP function rather than the current time.