If you do the key exchange face-to-face, all you need is some bytes from /dev/random for the key, and the cryptographic algorithm Data XOR Key. They can't outlaw the XOR operator and they can't "backdoor" all random number sources (not even the most trivial ones), so the idea that it is even remotely possible to obtain political control of encryption is quite insane.