Professional Documents
Culture Documents
One-Time Pad
One-Time Pad
net/publication/261056835
CITATIONS READS
22 3,439
2 authors:
All content following this page was uploaded by Mariusz Borowski on 10 December 2018.
I. INTRODUCTION
Diplomacy, military top commands and some special
government agencies need ever lasting absolute security and
privacy. Interception of some “TOP SECRET” plaintext by
hostile state or organization can prove destructive in two
months as wall as in a hundred years. The requirement of the
perfect cipher usage is obvious for the institutions. It is
important to recall that messages that were encrypted in the
1950's with 'state of the art' imperfect cipher machines, and
were kept archived by the adversary (which actually happened) Figure 1. Example of one time keys in a paper form
are now generally broken within a few seconds, minutes or
some hours at the most. On the other hand the messages that
were sent 60 years ago with any realization of perfect ciphering A. One-Time Pad in practice
will stay unbreakable for ever if the keys have been destroyed. We can only talk about OTP if four important rules are
followed. When rules are applied correctly, the one-time pad
Methods of realizating the perfect ciphering have changed
can be prove unbreakable (see Claude Shannon's
by decades from a pencil-and-paper version to a today’s PC
"Communication Theory of Secrecy Systems"). However, if
computer system equipped with modern software and provided
only one of these rules is disregarded, the cipher is no longer
other then confidentiality cryptographic services. It is
unbreakable.
interesting that all the methods of realizating the perfect
ciphering have the same perfect security. Obviously perfect 1. The key is as long as the plaintext.
security is not for free. The perfect cipher requires random keys
as long as the plaintext, a data management system and a 2. The key is truly random (not generated by simple
robust, trusted key distribution system. Shown in chapter 4 the computer Rnd functions or whatever!).
possibility for hardware generation of binary random 3. There should only be two copies of the key: one for the
sequences with the potential bit rate 100 Mbit/s eliminates the sender and one for the receiver (some exceptions exist for
restriction connected with availability of very long one-time multiple receivers).
keys for the perfect ciphering. Unfortunately, other than the
trusted couriering key distribution system still requires an 4. The keys are used only once, and both sender and receiver
effective and reasonably priced solution. must destroy their key after use.
III. ADVANCEMENT OF OTP CIPHER MACHINES Wide usage of microprocessor, personal computers,
magnetic data storage made it possible to replace electro-
Electro-mechanical OTP cipher machines were mechanical crypto machines in the nineties. Newly designed
manufactured in the fifties and the seventieth and widely used OTP cipher machine invariable application should ensure
in diplomacy and army on the highest levels of command. A unconditional information confidentiality by the use of the
famous example of one-time pad's security is the OTP cipher. Moreover, it should provide additional
Washington/Moscow hotline with the ETCRRM II (Fig.2) cryptographic services:
installed in 1963, a standard commercial one-time tape mixer • integrity of messages;
for telex. Although simple and cheap, it provided absolute
security and unbreakable communications between • cryptographic confidentiality of one-time keys;
Washington and the Kremlin, without disclosing any crypto
• integrity of one-time keys;
technology secret.
• secret sharing of keys needed to use the machine;
• authentication of correspondent machines;
• authentication of the key generation station;
• authentication of operators
• an automatic key generation and a secure connection
planning station.
The newly designed OTP cipher machine should also
support:
• compression of data to be ciphered;
• electronic accountability;
• electromagnetic emanation protection;
• wide usage of COTS electronic parts and applications.
An example of realization of the OTP cipher machine in
Figure 2. Electronic Teleprinter Cryptographic Regenerative Repeater Mixer today’s PC technology is shown in Fig. 3.
(ETCRRM)