You are on page 1of 6

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/261056835

Modern usage of “old” one-time pad

Conference Paper · January 2012

CITATIONS READS

22 3,439

2 authors:

Mariusz Borowski Marek Lesniewicz


Military Communication Institute Independent Researcher
8 PUBLICATIONS   33 CITATIONS    7 PUBLICATIONS   34 CITATIONS   

SEE PROFILE SEE PROFILE

All content following this page was uploaded by Mariusz Borowski on 10 December 2018.

The user has requested enhancement of the downloaded file.


Modern usage of “old” one-time pad

Mariusz Borowski, Marek Leśniewicz


Cryptology Division
Military Communication Institute
Zegrze, Poland

Abstract—Top commands of the arm forces and some special


military and government institutions need perfect security for II. VERNAM CIPHER OR ONE-TIME PAD
exchanging between them “TOP SECRET” information. Security The one-time pad (OTP), also called Vernam-cipher or the
of such information is not limited by time. Only the one-time pad perfect cipher, is a crypto algorithm where plaintext is
(perfect) cipher may be used to fulfill the requirements. combined with a random key. The one-time pad was developed
Realization of OTP cipher machines has changed for decades.
in 1917 by Gilbert Vernam for the use in telex machines. Each
Now capability to hardware generation of binary random
transmitted 5-bit Baudot code was mixed with a random 5-bit
sequences with the potential output rate 100 Mbit/s eliminates the
restriction connected with availability of very long one-time keys. code on a paper tape. Such tapes contained a large number of
Continuously generating the sequence (or one-time keys) with a these random 5-bit codes and were called one-time-tape. The
bit rate 100 Mbit/s and its direct, lossless recording to mass one-time tape ran synchronously on both the sender's and the
storage, the new hardware generator will be able to produce a receiver's telex. Vernam's invention was the basis for several
little more than 1 TB per day. OTP cipher machines have to be pencil-and-paper versions. The name one-time pad refers to the
supported by a trusted data management and couriering system. notepads on which the keys are printed as shown in Fig.1. In
general, these pads are small booklets or microfilms with
Keywords- a one-time pad, a hardware random bit generator, groups of five numbers or letters.
entropy, randomness, Markow chains.

I. INTRODUCTION
Diplomacy, military top commands and some special
government agencies need ever lasting absolute security and
privacy. Interception of some “TOP SECRET” plaintext by
hostile state or organization can prove destructive in two
months as wall as in a hundred years. The requirement of the
perfect cipher usage is obvious for the institutions. It is
important to recall that messages that were encrypted in the
1950's with 'state of the art' imperfect cipher machines, and
were kept archived by the adversary (which actually happened) Figure 1. Example of one time keys in a paper form
are now generally broken within a few seconds, minutes or
some hours at the most. On the other hand the messages that
were sent 60 years ago with any realization of perfect ciphering A. One-Time Pad in practice
will stay unbreakable for ever if the keys have been destroyed. We can only talk about OTP if four important rules are
followed. When rules are applied correctly, the one-time pad
Methods of realizating the perfect ciphering have changed
can be prove unbreakable (see Claude Shannon's
by decades from a pencil-and-paper version to a today’s PC
"Communication Theory of Secrecy Systems"). However, if
computer system equipped with modern software and provided
only one of these rules is disregarded, the cipher is no longer
other then confidentiality cryptographic services. It is
unbreakable.
interesting that all the methods of realizating the perfect
ciphering have the same perfect security. Obviously perfect 1. The key is as long as the plaintext.
security is not for free. The perfect cipher requires random keys
as long as the plaintext, a data management system and a 2. The key is truly random (not generated by simple
robust, trusted key distribution system. Shown in chapter 4 the computer Rnd functions or whatever!).
possibility for hardware generation of binary random 3. There should only be two copies of the key: one for the
sequences with the potential bit rate 100 Mbit/s eliminates the sender and one for the receiver (some exceptions exist for
restriction connected with availability of very long one-time multiple receivers).
keys for the perfect ciphering. Unfortunately, other than the
trusted couriering key distribution system still requires an 4. The keys are used only once, and both sender and receiver
effective and reasonably priced solution. must destroy their key after use.
III. ADVANCEMENT OF OTP CIPHER MACHINES Wide usage of microprocessor, personal computers,
magnetic data storage made it possible to replace electro-
Electro-mechanical OTP cipher machines were mechanical crypto machines in the nineties. Newly designed
manufactured in the fifties and the seventieth and widely used OTP cipher machine invariable application should ensure
in diplomacy and army on the highest levels of command. A unconditional information confidentiality by the use of the
famous example of one-time pad's security is the OTP cipher. Moreover, it should provide additional
Washington/Moscow hotline with the ETCRRM II (Fig.2) cryptographic services:
installed in 1963, a standard commercial one-time tape mixer • integrity of messages;
for telex. Although simple and cheap, it provided absolute
security and unbreakable communications between • cryptographic confidentiality of one-time keys;
Washington and the Kremlin, without disclosing any crypto
• integrity of one-time keys;
technology secret.
• secret sharing of keys needed to use the machine;
• authentication of correspondent machines;
• authentication of the key generation station;
• authentication of operators
• an automatic key generation and a secure connection
planning station.
The newly designed OTP cipher machine should also
support:
• compression of data to be ciphered;
• electronic accountability;
• electromagnetic emanation protection;
• wide usage of COTS electronic parts and applications.
An example of realization of the OTP cipher machine in
Figure 2. Electronic Teleprinter Cryptographic Regenerative Repeater Mixer today’s PC technology is shown in Fig. 3.
(ETCRRM)

Some other cipher machines that used the principle of one-time


pad are the American TELEKRYPTON, B-2 PYTHON and
SIGTOT, the British BID-590 NOREEN and 5-UCO, the
Canadian ROCKEX, the Dutch ECOLEX series, the Swiss
Hagelin CD-57 RT, the German Siemens T-37-ICA and
M-190, the East German T-304 LEGUAN, the Czech SD1, the
Russian M-100 SMARAGD and M-105 N AGAT and the
Polish T-352/T-353 DUDEK. There were also many teletype
or ciphering device configurations in combination with a tape
reader, for one-time tape encryption or superencipherement
[12].
Until the 1980's, one-time-tapes were widely used to secure Figure 3. Today’s realization of the OTP cipher machine
Telex communications. The Telex machines used Vernam's
original one-time pad principle. The system was simple but IV. DEVELOPMENT OF THE 100 MBIT/S HARDWARE
solid. Russian M-100 SMARAGD is an example of one-time GENERATOR AS “INFINITE” SOURCE OF ONE-TIME KEYS
pad crypto machine for telex communications. The key was
perforated on a paper wire, and a plaintext was also perforated Binary random sequences have numerous applications in
on a paper wire. The machine summed mod 2 information with many fields of science and security (military) usage. Due to the
the key from the two wires and transmitted the ciphertext to the lack of trusted sources of truly random sequences Military
line. When transmission had ended, the wires with the keys and Communication Institute (MCI) researched, implemented and
the plaintext were automatically cut. The machine M-100 developed a family of hardware random bit generators. The
SMARAGD was widely used in diplomacy and in Soviet Army generators can generate random sequences with an output rate
on the highest levels of command to the end of the nineties. 115.2 kbit/s up to 8 Mbit/s and they were certified by the Polish
The machine ensured perfect confidentiality of information. national security authority according to “The Protection of
Other cryptographic services were not supported. Classified Information Act” and can be used in cryptographic
systems up to “TOP SECRET” level [6].
In 2012 MIT decided to start the project of 100 Mbit/s national security authority according to “The Protection of
hardware generator. The theoretical goal of the project is to Classified Information Act”. After obtaining the certificate it
developing mathematical and technical methods of generation, will be allowed to be used in cryptographic systems up to
giving rise to the physical structure of the generator, “TOP SECRET” level. Data management system for OTP
implementing the hardware generation of binary random cipher machines is a perfect place to use the SGCL-100M
sequences with the potential throughput (amount of data per generator.
unit time) 100 Mbit/s, supported by a mathematical proof of
their randomness, which guarantees a set of sequences with C. Theory of hardware generation of binary random
required probabilistic characteristics and parameters, confirmed sequences with very high throughput
by statistical research [1]. The generator (a practical part of the
Military Communication Institute has already an outline of
project) will have a “certificate of type” issued by the national
theory of hardware generation of binary random sequences,
security authority according to “The Protection of Classified
which involves generation of many binary imperfectly random
Information Act” issued 05-th of August 2010. After obtaining
component sequences and their post-processing using XOR
the certificate it will be allowed to be used in cryptographic
sum to the form of perfectly random output sequences, then
systems up to “TOP SECRET” level. It will also be able to be
their superposition into one sequence. MIT has published
used in any scientific and technical applications.
reviewed monograph [3]. The monograph describes the
problem of generating sequences of 8 Mbit/s rate.
A. The SGCL-100M generator as a scientific tool
Binary random sequences have numerous applications in An introduction to the work will be dedicated the analysis
many fields of science and technology. The most important and synthesis of the mathematical basis of the theory of perfect
ones are applied in such fields as cryptography, statistics, and imperfect binary random sequences and impaction of
numerical computation, stochastic simulations using the Monte requirements for generated sequences. Further work will be
Carlo method, and many others. Unfortunately, due to the lack devoted to the analysis of selecting a source of randomness,
of sources of truly random sequences in above applications, conducted on the basis of analytical investigations and results
pseudo-random algorithmically generated sequences are used of the author’s experience in the practical generation of random
routinely, which often leads to bad results of the applications, sequences. Theoretical support of the analysis is the theory of
because such sequences do not have even mathematically analog and binary stochastic noise signals. As a result of these
proven statistical properties and parameters, and their studies, conditions for selection of potential sources of
probabilistic characteristics are usually unknown. randomness will be indicated, leading to a physical source of
randomness in the form of avalanche diodes batteries, which
As a scientific tool the SGCL-100M generator will be used generate Poisson signals with controlled randomness. The
in advanced researches in the field of probability theory, the target theory of generation, however, there will be formulated
theory of stochastic signals and information theory. on the basis of the author’s approach, using the original theory,
Assumptions of such high bit-rate output of the generator is based on integrated considerations, resulting from the above
caused by the fact, that in the most modern applications very experiences. Experimental support for the scientific tools will
large samples of random sequences are required, reaching be resulted from the experiments and statistical measurement.
gigabytes on one calculation or simulation. At the rate 100
Mbit/s a sample of 1 GB size is generated in approximately 90 Proof of randomness of generated sequences will be based
seconds. on the analysis and synthesis of Poisson signals, modeled as
stochastic, binary Markov chains. The methodology of the
proof will be based on the probabilistic-signal risk analysis of
B. The SGCL-100M generator as “infinite” source of
imperfectly random sequences generation [1]. In addition to
one-time keys assessing the quality of sequences in the above sense, the
OTP cipher machines use one-time keys as long as a security analysis of the generator operation will be made from
plaintext (and only once) so key accessibility is critical [4]. the viewpoint of electromagnetic compatibility and
Possibility for hardware generation of binary random electromagnetic leakage of information.
sequences with the potential bit rate 100 Mbit/s eliminates the
restriction connected with availability of very long one-time Theoretical part of the work also requires to formalize the
keys for the OTP cipher. The SGCL-100M will be able to mathematical description and to show what properties and
generate continuously the one-time keys with bit rate 100 parameters will have such a sequence. Then, the prototypes of
Mbit/s. The keys can be recorded by a data management three generators will be constructed, which will be used for the
system for OTP cipher machines to mass storage. The practical verification of the theory.
generator will be able to produce a little more than 1 TB
one-time keys per day and act as a practically “infinite” source D. Hardware and software realization of the SGCL-100M
of one-time keys. generator
The prototype of the generator and the necessary Technical design problems connected with the
documentation will be forwarded to the certification in SGCL-100M generator are encountered on two levels - the
accordance with the Polish “The Protection of Classified electronics and the programming. The electronic board of the
Information Act” issued 05-th of August 2010. The generator generator will consist of 48 generators (Fig. 4), which must be
will have to possess a “certificate of type” issued by the calibrated to generation state consistent with the Poisson signal
theory. The stability of the properties and parameters of such a
signal as a function of time and climate-mechanical exposures devices and development of computer systems, generation
must be tested. The electronic system will also consist of a systems were equipped with mechanisms of planning secure
programmable chip, in which all post-processing operations connections and an element responsible for distribution. Only
will be performed, including formatting of the sequence before such systems can be called cryptographic data management
its sending. Transmission of the sequence from the generator to systems. These complex management systems has been built
the computer will take place through a standard 100Base-TX since the middle of the nineties. They raised efficiency of data
Ethernet. As handling of this interface with full throughput is a processing and security. The data management systems are
very difficult task, the dedicated Ethernet interface controller intended to deliver correct and reliable key data to proper
will be used and it will be controlled by RISC microprocessor cryptographic devices. OTP cipher machines demand a data
that will perform the data transfer between the programmable management system [4]. The system consists of: a secure
chip and a controller in DMA (Direct Memory Access) mode. connecting planning station and a key generation station. OTP
In practice, only such solution allows to achieve full cipher machines machine can work in two modes: ”in a
throughput of 100 Mbit/s. direction way” and “in a circular way” These two modes of
operation should be introduced by the secure connecting
planning station.

A. The secure planning connection station


The main aim of the secure planning connection station is
to implement only really necessary connections in an OTP
cipher machines net. The OTP cipher machine uses one-time
keys and time of generating keys is an important factor of a key
generating process. “In a direction way” mode needs
generation of unique keys for each direction therefore an
automatic making connection “each to each” is disabled in the
planning station. “In a circular way” mode needs only
generation of unique keys for a whole circular. The information
about the OTP cipher machine planned networks includes the
number of OTP cipher machines, types of directions, number
Figure 4. The model of 100 Mbit/s hardware generator SGCL-100M of one-time keys. Then the information goes to the key
generation station. The secure connecting planning station
The generator, even though its hardwareness is a very should be built with the use of a hardened, electromagnetic
complex object, requires software. The software is generally emanation leakage resistant computer set.
required by two circuits – a programmable chip (a program in
AHDL, a VHDL language in the corporate version of Altera) B. The key generation station
and RISC microprocessor (programs in C/C++ with "inserts" in
the assembler). The both softwares must be optimized due to The key generation station generates keys on the basis of
the efficiency of data transfer, to avoid a conflict with the the information obtained from the secure connecting planning
essential functions of a random sequence generation. The station. The keys are generated for all algorithms used by the
correctness of theoretical assumptions and the correctness of OTP cipher machine. Of course the longest time is needed for
technical solutions - including software - will be confirmed generating one-time keys. One-time keys are automatically
experimentally by statistical testing of generators in any case at generated, ciphered and signed by the key generation station.
all stages of the development. Cryptographic keys do not leave the station unprotected:
ciphered one-time keys are copied on One-Time Key (OTK)
Since the generator is a quite complex and costly device modules and symmetric and asymmetric keys needed to fulfill
with a very high output rate it can be assumed that it could be additional cryptographic services of OTP cipher machines are
used as a source for random sequence servers in R&D centers. transferred to temper-resistant smart cryptographic modules.
The quality of keys generated by the key generation station
V. DATA MANAGEMENT FOR OTP CRYPTO MACHINES
depends on a random keys generator. The key generation
Data management systems have been subject to big station uses a hardware random bit generator. Basic
changes over the time of cryptographic systems development. characteristics and parameter of the generator:
At the beginning they were simple elements producing only
keys in open (not encrypted) form – key generators. The other • generation of random binary streams with speed up to
operations connected with data processing (i.e. protecting, 100 Mbit/s;
storing) were carried out by a person. Such kind of the key • good statistical quality of generated binary random
management system was used by the OTP cipher machines in streams confirmed by appropriate statistical tests
the seventieth [7]. [5,8,9,10];
In the next stages tasks of system development generators • user-friendly utilisation and maintenance of generated
were widened to recording results, protection (ciphering), and bit streams quality; alarm activation while statistical
authentication. Such extended systems are called generation defects are detected [6];
systems. As a result of a rising number of cryptographic
• full electromagnetic emanation safety - lack of Therefore, one-time key encryption is still well-suited in
penetration. specific circumstances where absolute security is preferable to
practical considerations, regardless of the cost of secure
The random bit generator will have the “certificate of type” physical transport of keys by couriering.
issued by the national security authority. The certificate must
determinate that generator is suitable for generating data for In the future quantum key distribution (QKD) may be
usage in cryptosystems up to “TOP SECRET” level. helpful as an alternative for secure physical transport of keys
by couriering. The security of quantum key distribution relies
VI. ONE-TIME PADS IN TODAY'S WORLD on the foundations of quantum mechanics, in contrast to a
traditional key distribution protocol which relies on the
In the PC computer era, modern algorithms such as computational difficulty of certain mathematical functions. An
symmetric block ciphers and asymmetric public key algorithms interesting and promising method of QKD was presented in [2]
replaced one-time pads because of practical considerations and with usage of Professor Artur Ekert type of QKD [11]. But at
solutions to key distribution problems. Modern crypto present the ability of efficient QKD usage is still an open
algorithms provide practical (not proved) security and privacy, question.
essential to our economy and everyday life. However, top
commands of the arm forces and some special military and
REFERENCES
government institutions need ever lasting absolute security and
privacy, and that is only possible with one-time encryption. [1] M. Leśniewicz, “Sprzętowa generacja ciągów losowych z
przepływnością 100 Mbit/s. Hardware generation of binary sequences
Some experts argue that the distribution of large quantities with throughput 100 Mbit/s,” Przegląd Telekomunikacyjny nr 11/2011.
of one-time pads or keys is impractical. This was indeed the [2] W. Nowakowski, “O kryptografii kwantowej. About quantum
limitation in the era of paper tapes on reels and paper pads cryptography,” Elektronika, nr 2, Warszawa 2010.
(Fig.1). However, today’s electronics, as the SGCL-100M [3] M. Leśniewicz, Sprzętowa generacja losowych ciągów binarnych.
generator shown in Fig.4 and described in chapter 4 of the Hardware generation of binary random sequences, WAT, Warszawa
2009, ISBN 978-83-61486-31-2.
article will be able to act as a practically “infinite” source of
[4] M. Borowski, R. Wicik, “A one-time cipher machine for Polish Army,”
one-time keys. Capability to one-time keys generation will be Military Communication Conference,” Prague, 2008.
no limitation any longer. Today’s realization of OTP cipher [5] R. Wicik, M. Borowski, “Randomness testing of some random and
machines (Fig.3) with embedded current one-time encryption pseudorandom sequences,” Military Communication Conference,
software can process large quantities of data at high speed. Prague, 2008.
[6] P. Komorowski, M. Leśniewicz, “Sprzętowy generator binarnych
Current data storage technology such as USB sticks, ciągów losowych o wyjściowej przepływności 1 MB/s. A hardware
DVD’s, external hard disks, solid-state drives or dedicated binary genertaor with output throughput 1 MB/s,” X Krajowa
OTK modules to enable the physical transport of enormous Konferencja Zastosowań Kryptografii ENIGMA 2006.
quantities of truly random keys. Actual sensitive [7] W.Oszywa, M.Gawroński, T.Czajka “Hierarchic cryptographic data
communications are often limited to a small number of management system,” Bulletin of Military Communication Institute,
important users. In such cases, one-on-one communications 2005.
with the associated key distribution, possibly in configuration [8] R.Gliwa, M.Leśniewicz, R.Wicik, “Testing of hardware-based random
bit generators utilized in cryptography”, National Telecommunication
with a star topology, is no longer a practical problem, Symposium, Bydgoszcz, 2002.
especially considering the security benefits. By using a
[9] W. Schindler, W. Killmann, “Evaluation Criteria for True (Physical)
so-called sneakernet (transferring data on removable media by Random Number Generators Used in Cryptographic Applications,”
physical couriering), you can reach a throughput of one-time Workshop on Cryptographic Hardware and Embedded Systems
keys that is greater than what a network can process on CHES,2002, Springer-Verlag Berlin Heidelberg 2003.
encrypted data. In other words, it could take a few hours to [10] A. J. Menezes, P. C. van Oorschot, S. A. Vanstone, Handbook of applied
drive a terabyte of key material, stored on an external drive, by cryptography, CRC Press, 1997.
car to someone, but it will take days or even weeks to consume [11] A.K. Ekert, “Quantum cryptography based on Bell’s theorem,” Physical.
that amount of keys on a broadband network. A terabyte sized Review Letters, 1991.
key can easily encrypt e-mail traffic of special (military or [12] D. Rijmenants', Cipher Machines and Cryptology, Historical and
Technical Information about Crypto Machines, Cryptology and Free
diplomacy users) for a year, including attachments. Software Simulations, http://users.telenet.be/d.rijmenants/index.htm

View publication stats

You might also like