Your SlideShare is downloading. ×
0
Otp
Otp
Otp
Otp
Otp
Otp
Otp
Otp
Otp
Otp
Otp
Otp
Otp
Otp
Otp
Otp
Otp
Otp
Otp
Otp
Otp
Otp
Otp
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Otp

352

Published on

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
352
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
8
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  1. One Time Pad Usage (OTP) SSG Ryan J. Gomez – U.S. Army "If you think cryptography can solve your problem, then you don't understand your problem and you don't understand cryptography." -- Bruce Schneier
  2. Terminal Learning Objective Terminal Learning Objective: Action: Correctly identify and utilize a OTP. Condition: Given a OTP, correct keying material, and scratch paper & writing utensil in a classroom environment. Standard: Decrypt and Encrypt a OTP message.
  3. Safety, Risk, and Environmental Considerations Safety Requirements: None Risk Assessment: Low Environmental Considerations: None
  4. Evaluation Evaluation: Show an understanding of OTP usage and productively participate in group discussion.
  5. Enabling Learning Objective (ELO) ELO: Cryptology and History of OTP usage.
  6. History of Cryptography and OTP Usage * The Earliest methods of cryptography were altered hieroglyphics attempting to pass secret messages. * WWII messages were primarily mechanically generated. * Modern cryptography utilizes mathematically based encryption.
  7. Overview of Cryptography Terminology <ul><li>Cryptographic/Cipher System - A method of disguising a message so only authorized users may read it. </li></ul><ul><li>Cryptology - The study of cryptography. </li></ul><ul><li>Encryption - The process of converting plaintext into ciphertext. </li></ul><ul><li>Decryption - The process of converting ciphertext back to its original plaintext. </li></ul><ul><li>Cryptographic Algorithm - The computational procedure used to encrypt and decrypt messages. </li></ul><ul><li>Cryptanalysis - The process of finding a weakness in, or actual breaking of, a cryptographic system. </li></ul>
  8. Overview of Cryptography What’s the point? <ul><li>Privacy - Would you be willing to send all of your correspondence through the U.S. Mail on the back of a postcard for all to read? </li></ul><ul><li>Data Integrity - Provides assurance that a message or file has not been altered </li></ul><ul><li>Source Authentication - Provides a method to identify the originator of a message or file </li></ul>
  9. Types of Cryptographic Systems Secret Codes <ul><li>The simplest and oldest way to send a secret message to someone. The code must be known to the sender or recipient. </li></ul>Code Phrase True Meaning My coffee is cold Pass the cream Launch the missiles Don’t launch the missiles
  10. Enabling Learning Objective <ul><li>ELO: Usage of OTPs in the Contemporary Operating Environment. </li></ul>
  11. Intelligence Information Securely <ul><li>*Intelligence Gathering </li></ul><ul><li>*Itelligence Agent Reporting </li></ul><ul><li>*Embedded Agent Reporting </li></ul>
  12. Enabling Learning Objective <ul><li>ELO: Understanding Cryptographic Systems </li></ul>
  13. Types of Cryptographic Systems Ciphers <ul><li>Substitution ciphers are the simplest type of cipher system. </li></ul><ul><li>Each letter of the alphabet is assigned to a number or different letter. </li></ul><ul><li>ROT13 is a commonly used cipher. </li></ul>A B C D E F G H I J K L M 1 2 3 4 5 6 7 8 9 A B C . . .
  14. Types of Cryptographic Systems One-Time Pads <ul><li>One-Time Pads uses a different key for a specific time period. </li></ul><ul><li>Truly secure, no patterns evolve. </li></ul><ul><li>Most vulnerabilities due to human carelessness. </li></ul>Decrypted Text 14 07 09 06 10 02 25 13 17 08 15 One-Time Pad - Shift each encrypted letter x places to the right A B C D E F G H I J K L M N O P Q R S T U V W X Y Z fazmyqbgnke Encrypted Message This is a test
  15. Crypto Keys & Algorithms General Concepts and Definitions <ul><li>As a password is used to access a computer system, a cryptographic key is a password or passphrase that is used to unlock an encrypted message. </li></ul><ul><li>Different encryption systems offer different key lengths - Just as a longer password provides more security (WindowsNT excluded) the longer and more complex the key is, the more security an encryption system provides. </li></ul><ul><li>A cryptographic algorithm is a mathematical function used for encryption and decryption. Most algorithms contain a certain number of “rounds.” This determines how many times the text will be run through the algorithm </li></ul>
  16. One Time Pad The above is an example of a page from a standard one time pad. The encryption & decryption keys are impossible to decipher when generated using entirely random keys.
  17. Check on Learning <ul><li>What is the most secure method of non-personal communication? </li></ul><ul><li>What method of encryption was utilized during WWII? </li></ul><ul><li>What is the most secure method of generating a key? </li></ul>
  18. One Time Pad <ul><li>ELO: Cypher and Decypher a One Time Pad message. </li></ul>
  19. Cyper and Decypher a OTP Message <ul><li>The one-time pad is a long sequence of random letters. These letters are combined with the plaintext message to produce the ciphertext. To decipher the message, a person must have a copy of the one-time pad to reverse the process. A one-time pad should be used only once (hence the name) and then destroyed. This is the first and only encryption algorithm that has been proven to be unbreakable. </li></ul>
  20. Encipher OTP Message <ul><li>To encipher a message, you take the first letter in the plaintext message and add it to the first random letter from the one-time pad. For example, suppose you are enciphering the letter S (the 19th letter of the alphabet) and the one-time pad gives you C (3rd letter of the alphabet). You add the two letters and subtract 1. When you add S and C and subtract 1, you get 21 which is U. Each letter is enciphered in this method, with the alphabet wrapping around to the begining if the addition results in a number beyond 26 (Z). </li></ul>
  21. Decipher OTP Message <ul><li>To decipher a message, you take the first letter of the ciphertext and subtract the first random letter from the one-time pad. If the number is negative you wrap around to the end of the alphabet. </li></ul>
  22. Example <ul><li>Example </li></ul><ul><li>Plaintext: SECRETMESSAGE </li></ul><ul><li>One-time pad: CIJTHUUHMLFRU </li></ul><ul><li>Ciphertext: UMLKLNGLEDFXY </li></ul><ul><li>A B C D E F G H I J K L M N O P Q R S T U V W X Y Z </li></ul><ul><li>1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 25 </li></ul>
  23. Summary <ul><li>History </li></ul><ul><li>Cryptography </li></ul><ul><li>One Time Pad Usage </li></ul>

×