SlideShare a Scribd company logo
1 of 17
Download to read offline
One-Time Pad
The Only Unbreakable Cipher
Ralph Simpson
Ralph@CipherMachines.com
Charlotte International Cryptologic Symposium
March 20, 2014
One-Time Pad: The Only Unbreakable Cipher 2
 What is the One-Time Pad?
 History of the Invention
 Types of One-Time Cipher Devices
• Teletype One-Time Tape
• One-Time Pads
• Other One-Time Devices
 History Rewritten
 Three Vulnerabilities of One-Time Pad
 Summary
Agenda
One-Time Pad: The Only Unbreakable Cipher 3
What is the One-Time Pad?
One-Time Pad
 Cipher named after small pads of random
numbers, used only one time
 Requires the following to be added to a message:
(1) a truly random number string
(2) as long as the message
(3) pad is used once and destroyed
Gilbert Vernam Joseph Mauborgne
 Co-invented in 1919 by Gilbert
Vernam (AT&T) and Joseph
Mauborgne (US Signal Corps)
 Claude Shannon proved it to be
mathematically unbreakable in 1945
 It is the only unbreakable cipher
History of the Invention
4
 In 1917, Vernam invented a teletype “secret signaling
system”, patent granted in 1919
 Elegant solution uses electronic relays to perform
Boolean XOR function to add random letters to plaintext
 Vernam advocated mixing 2 relatively prime loops of
random tape (1000 and 999 characters in length)
 In 1919, Mauborgne realized a one-time tape would be
unbreakable
 The one-time teletype and was the first automated and
online ciphering system
Vernam 1919 patent
One-Time Pad: The Only Unbreakable Cipher
 The NSA call this patent, “perhaps one of the most important in the history
of cryptography”
 First use of pads of paper by Germans came later, in 1923
 In 2011, it was discovered the one-time pad was previously invented in 1882
SIGTOT One-Time Tape
5
 AT&T marketed Vernam cipher in 1920s with little success, until WW2
 The US SIGTOT uses the Vernam patent
 SIGTOT used by US military from 1925 to 1959
 Used in the White House and FDR’s airplane (now in the NCM)
 President Truman personally typed on the SIGTOT during WW2
SIGTOT Receiving Transmitter/Distributor
One-Time Pad: The Only Unbreakable Cipher
Example of Boolean XOR Function
6
 Characters represented in 5 bit Baudot code
 Exclusive Or (XOR) function same as modulo 2 addition
 Random tape used to XOR between plaintext and ciphertext:
1 1 0 0 0 Plaintext letter A
1 0 0 1 1 Random key letter B
0 1 0 1 1 Result of XOR, ciphertext letter G which is sent
0 1 0 1 1 Ciphertext letter G received
1 0 0 1 1 Random key letter B
1 1 0 0 0 Result of XOR, original plaintext letter A
 Automatic, elegant and self-reciprocal!
 Leap in technology compared to the most common ciphering systems at the
time: code books and Vigenère wheel
One-Time Pad: The Only Unbreakable Cipher
Other Teletype One-Time Tape Devices
One-Time Pad: The Only Unbreakable Cipher 7
 Usually reserved for highest level secure messages
 Required the same random tape for sender and receiver
 Teletype machines are not classified, the one-time tapes are “Top Secret”
 Allows for exchange of messages between countries without revealing
cryptologic systems, ex. Washington – Moscow hotline
 Producing, distributing and destroying tapes was a burden and security
risk, limiting use to military and diplomatic purposes
 Examples of teletype one-time cipher machines:
• US SIGTOT
• Norway ETCRRM
• Hagelin T-55
• German T-37 ICA
• E. German T-304
• British BID-590
• Dutch ECOLEX
• Canadian Rockex
• Russian M100
• Czech SD1
One-Time Pads
8
 First used in 1923 by German Foreign Office
 Used extensively by spies because the pads were easily concealed, other
cipher devices were not needed and the cipher was unbreakable
 Pads were often shrunk to a very small size and made of flammable material
One-Time Pad: The Only Unbreakable Cipher
One-time pad, microdot reader concealed
in toy, found on spy entering Canada
One-Time Pad: The Only Unbreakable Cipher 9
Other One-Time Devices
 Hagelin incorporated one-time tape into some
traditional pin and lug cipher machines, including
the C-446-RT, CX-52-RT and handheld CD-57-RT
 Hagelin also sold a traditional teletype one-time
tape machine, the T-55
 Some T-55’s included CX-52 pin and lug option, which is not a random one-
time function, so it is breakable
 Hagelin one-time tape machines were manual, but avoided the setting of
pins, lugs and wheels
Hagelin T-55
Hagelin CX-52-RT
Hagelin C-442-RT
Other One-Time Ciphers
10
 During WW2, US SIGSALY voice encryption was the first digital voice cipher,
using noise for one-time records
 Since plaintext voice was mixed with a record, some writers erroneously
report this as an analog cipher
 Used by Churchill and Roosevelt in WW2 and never broken
Random noise on records
SIGSALY in NCM
One-Time Pad: The Only Unbreakable Cipher
One-Time Pad: The Only Unbreakable Cipher 11
History Rewritten
Frank Miller
 In 2011, Steven Bellovin, a Columbia University professor,
discovered a prior invention of the one-time pad
 Frank Miller, a Sacramento CA bank president, described
the one-time pad in a book written in 1882
 The book, “Telegraphic Code to Insure Privacy and
Secrecy in the Transmission of Telegrams,” was written
for banks, fewer than 200 books printed
 During the Civil War, Miller worked for Col. Henry Steel Olcott, investigating
fraud and corruption, including the use of ciphers
 Miller’s book was a telegraphic code book and his explanation of using the
one-time pad was very specific:
“A banker in the West should prepare a list of irregular numbers to be called
'shift numbers', such as 483, 281, 175, 892, &c. The differences between such
numbers must not be regular. When a shift-number has been applied, or used,
it must be erased from the list and not be used again.”
History Rewritten (twice?)
12
One-Time Pad: The Only Unbreakable Cipher
Steven Bellovin
 In 2013, Bellovin presented arguments that the one-
time tape teletype was invented solely by Vernam,
although he may not have understood the
cryptologic significance
 Mauborgne later codified the requirements for non-
repetition, with collaboration from Parker Hitt and
William F. Friedman
 William F. Friedman’s work on breaking the two-tape
system may have led him to his groundbreaking invention of the “index of
coincidence”
One-Time Pad: The Only Unbreakable Cipher 13
3 Vulnerabilities of One-Time Pads
1. Reuse of one-time pads, ex. Venona Project
• In 1942, Russians had so many spies, they carbon-copied 35,000 pads
• Of 1.5M total diplomatic messages sent (1942-48), 1M intercepted,
30,000 used duplicate pads, 2,900 partially decrypted
• Most duplicate pads were used from 1942-45
• US decryption showed Russian spying on Manhattan Project, spies in
almost every major military and diplomatic organization, including
White House, OSS, MI6, etc.
• 349 Americans mentioned, about half identified
• Venona Project closed in 1980, declassified in 1995
Reuse of one-time tape, ex. Moscow – Canberra messages
• In 1945, US discovered Russians used the same one-time tape for
Moscow-Canberra and Moscow - Washington
One-Time Pad: The Only Unbreakable Cipher 14
3 Vulnerabilities of One-Time Pads
2. Non-random pads, ex. German Foreign Office in WW2
• German Foreign Office used machine generated tapes, which were
not random, for a system codenamed GEE
• Used for high level diplomatic messages
• The US solved this cipher in 1944, Germans continued to use GEE for
another 10 years
• Earliest intercepted message solved was from 1925
15
3 Vulnerabilities of One-Time Pads
3. Electronic emissions, ex. TEMPEST
 First discovered by AT&T in 1943, electronic emissions from
keyboards, printers, voice, etc can identify plaintext before encryption
 Not limited to one-time teletype machines
 Faint artifacts of plaintext travels through the air, signal wires, electric
wires, plumbing and can be tapped for up to 20 miles
 US exploited this capability to capture messages in the Berlin hub in
1955, tunneling under the Berlin wall to tap phone and teletype lines
One-Time Pad: The Only Unbreakable Cipher
Summary
16
 One-time pads can be absolutely secure for high level messages
 Allows countries to exchange messages without revealing cipher secrets
 Burden of distributing and managing tapes limits usefulness
 US discontinued use of SIGTOT in 1959, mainly due to Tempest
 Ease of use and additional functionality of public key encryption
supersedes use of one-time ciphers
One-Time Pad: The Only Unbreakable Cipher
 One-time pads may return to
prominence when quantum
cryptography is developed
Download this Presentation
One-Time Pad: The Only Unbreakable Cipher 17
You can download this powerpoint presentation here:
CipherMachines.com/otp.ppt

More Related Content

Similar to 005813616.pdf

Alan turing - Life History & how he broke enigma code?
Alan turing - Life History & how he broke enigma code?Alan turing - Life History & how he broke enigma code?
Alan turing - Life History & how he broke enigma code?Hariharan Ganesan
 
History of computers - Modern
History of computers - ModernHistory of computers - Modern
History of computers - ModernDamian T. Gordon
 
Secret History: Why Stanford and Not Berkeley?
Secret History: Why Stanford and Not Berkeley?Secret History: Why Stanford and Not Berkeley?
Secret History: Why Stanford and Not Berkeley?Stanford University
 
The Engima Cipher
The Engima CipherThe Engima Cipher
The Engima Cipherguestfaf89d
 
1st week history-of-computers.pptx
1st week history-of-computers.pptx1st week history-of-computers.pptx
1st week history-of-computers.pptxJohnPeterPaulGarces
 
Silicon valley past, present, future always on july28 2010
Silicon valley past, present, future always on july28 2010Silicon valley past, present, future always on july28 2010
Silicon valley past, present, future always on july28 2010Stanford University
 
Science, Technology and society
Science, Technology and society Science, Technology and society
Science, Technology and society AnnelyJaneDarbe
 
Secret History Stanford E Week Feb 21 2010
Secret History Stanford E Week Feb 21 2010Secret History Stanford E Week Feb 21 2010
Secret History Stanford E Week Feb 21 2010Stanford University
 
Rc 7.telephone telegraph
Rc 7.telephone telegraphRc 7.telephone telegraph
Rc 7.telephone telegraphBill Kovarik
 
Enigma History
Enigma HistoryEnigma History
Enigma HistoryMike Koss
 
(ノ◕ヮ◕)ノ*:・゚✧ Alan Turing
(ノ◕ヮ◕)ノ*:・゚✧ Alan Turing(ノ◕ヮ◕)ノ*:・゚✧ Alan Turing
(ノ◕ヮ◕)ノ*:・゚✧ Alan Turingthelittlestbishop
 
Final Poster for Senior Seminar
Final Poster for Senior SeminarFinal Poster for Senior Seminar
Final Poster for Senior SeminarKasner Margaret
 
The Secret History of Silicon Valley
The Secret History of Silicon ValleyThe Secret History of Silicon Valley
The Secret History of Silicon ValleyVasily Ryzhonkov
 

Similar to 005813616.pdf (19)

Alan turing - Life History & how he broke enigma code?
Alan turing - Life History & how he broke enigma code?Alan turing - Life History & how he broke enigma code?
Alan turing - Life History & how he broke enigma code?
 
History of computers - Modern
History of computers - ModernHistory of computers - Modern
History of computers - Modern
 
Secret History: Why Stanford and Not Berkeley?
Secret History: Why Stanford and Not Berkeley?Secret History: Why Stanford and Not Berkeley?
Secret History: Why Stanford and Not Berkeley?
 
The Engima Cipher
The Engima CipherThe Engima Cipher
The Engima Cipher
 
1st week history-of-computers.pptx
1st week history-of-computers.pptx1st week history-of-computers.pptx
1st week history-of-computers.pptx
 
Elp1 26
Elp1 26Elp1 26
Elp1 26
 
Silicon valley past, present, future always on july28 2010
Silicon valley past, present, future always on july28 2010Silicon valley past, present, future always on july28 2010
Silicon valley past, present, future always on july28 2010
 
Science, Technology and society
Science, Technology and society Science, Technology and society
Science, Technology and society
 
Secret History Stanford E Week Feb 21 2010
Secret History Stanford E Week Feb 21 2010Secret History Stanford E Week Feb 21 2010
Secret History Stanford E Week Feb 21 2010
 
Rc 7.telephone telegraph
Rc 7.telephone telegraphRc 7.telephone telegraph
Rc 7.telephone telegraph
 
Rc 10.computers
Rc 10.computersRc 10.computers
Rc 10.computers
 
Enigma History
Enigma HistoryEnigma History
Enigma History
 
jbjnkn.pptx
jbjnkn.pptxjbjnkn.pptx
jbjnkn.pptx
 
Drone technology
Drone technologyDrone technology
Drone technology
 
(ノ◕ヮ◕)ノ*:・゚✧ Alan Turing
(ノ◕ヮ◕)ノ*:・゚✧ Alan Turing(ノ◕ヮ◕)ノ*:・゚✧ Alan Turing
(ノ◕ヮ◕)ノ*:・゚✧ Alan Turing
 
Final Poster for Senior Seminar
Final Poster for Senior SeminarFinal Poster for Senior Seminar
Final Poster for Senior Seminar
 
One time Pad Encryption
One time Pad EncryptionOne time Pad Encryption
One time Pad Encryption
 
The Secret History of Silicon Valley
The Secret History of Silicon ValleyThe Secret History of Silicon Valley
The Secret History of Silicon Valley
 
history of computer
history of computerhistory of computer
history of computer
 

More from KalsoomTahir2

More from KalsoomTahir2 (20)

009576860.pdf
009576860.pdf009576860.pdf
009576860.pdf
 
005813185.pdf
005813185.pdf005813185.pdf
005813185.pdf
 
HASH FUNCTIONS.pdf
HASH FUNCTIONS.pdfHASH FUNCTIONS.pdf
HASH FUNCTIONS.pdf
 
6. McCall's Model.pptx
6. McCall's Model.pptx6. McCall's Model.pptx
6. McCall's Model.pptx
 
ch02-Database System Concepts and Architecture.ppt
ch02-Database System Concepts and Architecture.pptch02-Database System Concepts and Architecture.ppt
ch02-Database System Concepts and Architecture.ppt
 
9223301.ppt
9223301.ppt9223301.ppt
9223301.ppt
 
11885558.ppt
11885558.ppt11885558.ppt
11885558.ppt
 
Indexing.ppt
Indexing.pptIndexing.ppt
Indexing.ppt
 
chap05-info366.ppt
chap05-info366.pptchap05-info366.ppt
chap05-info366.ppt
 
1650607.ppt
1650607.ppt1650607.ppt
1650607.ppt
 
005281271.pdf
005281271.pdf005281271.pdf
005281271.pdf
 
soa_and_jra.ppt
soa_and_jra.pptsoa_and_jra.ppt
soa_and_jra.ppt
 
ERP_Up_Down.ppt
ERP_Up_Down.pptERP_Up_Down.ppt
ERP_Up_Down.ppt
 
Topic1CourseIntroduction.ppt
Topic1CourseIntroduction.pptTopic1CourseIntroduction.ppt
Topic1CourseIntroduction.ppt
 
Lecture 19 - Dynamic Web - JAVA - Part 1.ppt
Lecture 19 - Dynamic Web - JAVA - Part 1.pptLecture 19 - Dynamic Web - JAVA - Part 1.ppt
Lecture 19 - Dynamic Web - JAVA - Part 1.ppt
 
CommercialSystemsBahman.ppt
CommercialSystemsBahman.pptCommercialSystemsBahman.ppt
CommercialSystemsBahman.ppt
 
EJBDetailsFeb25.ppt
EJBDetailsFeb25.pptEJBDetailsFeb25.ppt
EJBDetailsFeb25.ppt
 
jan28EAI.ppt
jan28EAI.pptjan28EAI.ppt
jan28EAI.ppt
 
005428052.pdf
005428052.pdf005428052.pdf
005428052.pdf
 
jini-1.ppt
jini-1.pptjini-1.ppt
jini-1.ppt
 

Recently uploaded

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 

Recently uploaded (20)

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 

005813616.pdf

  • 1. One-Time Pad The Only Unbreakable Cipher Ralph Simpson Ralph@CipherMachines.com Charlotte International Cryptologic Symposium March 20, 2014
  • 2. One-Time Pad: The Only Unbreakable Cipher 2  What is the One-Time Pad?  History of the Invention  Types of One-Time Cipher Devices • Teletype One-Time Tape • One-Time Pads • Other One-Time Devices  History Rewritten  Three Vulnerabilities of One-Time Pad  Summary Agenda
  • 3. One-Time Pad: The Only Unbreakable Cipher 3 What is the One-Time Pad? One-Time Pad  Cipher named after small pads of random numbers, used only one time  Requires the following to be added to a message: (1) a truly random number string (2) as long as the message (3) pad is used once and destroyed Gilbert Vernam Joseph Mauborgne  Co-invented in 1919 by Gilbert Vernam (AT&T) and Joseph Mauborgne (US Signal Corps)  Claude Shannon proved it to be mathematically unbreakable in 1945  It is the only unbreakable cipher
  • 4. History of the Invention 4  In 1917, Vernam invented a teletype “secret signaling system”, patent granted in 1919  Elegant solution uses electronic relays to perform Boolean XOR function to add random letters to plaintext  Vernam advocated mixing 2 relatively prime loops of random tape (1000 and 999 characters in length)  In 1919, Mauborgne realized a one-time tape would be unbreakable  The one-time teletype and was the first automated and online ciphering system Vernam 1919 patent One-Time Pad: The Only Unbreakable Cipher  The NSA call this patent, “perhaps one of the most important in the history of cryptography”  First use of pads of paper by Germans came later, in 1923  In 2011, it was discovered the one-time pad was previously invented in 1882
  • 5. SIGTOT One-Time Tape 5  AT&T marketed Vernam cipher in 1920s with little success, until WW2  The US SIGTOT uses the Vernam patent  SIGTOT used by US military from 1925 to 1959  Used in the White House and FDR’s airplane (now in the NCM)  President Truman personally typed on the SIGTOT during WW2 SIGTOT Receiving Transmitter/Distributor One-Time Pad: The Only Unbreakable Cipher
  • 6. Example of Boolean XOR Function 6  Characters represented in 5 bit Baudot code  Exclusive Or (XOR) function same as modulo 2 addition  Random tape used to XOR between plaintext and ciphertext: 1 1 0 0 0 Plaintext letter A 1 0 0 1 1 Random key letter B 0 1 0 1 1 Result of XOR, ciphertext letter G which is sent 0 1 0 1 1 Ciphertext letter G received 1 0 0 1 1 Random key letter B 1 1 0 0 0 Result of XOR, original plaintext letter A  Automatic, elegant and self-reciprocal!  Leap in technology compared to the most common ciphering systems at the time: code books and Vigenère wheel One-Time Pad: The Only Unbreakable Cipher
  • 7. Other Teletype One-Time Tape Devices One-Time Pad: The Only Unbreakable Cipher 7  Usually reserved for highest level secure messages  Required the same random tape for sender and receiver  Teletype machines are not classified, the one-time tapes are “Top Secret”  Allows for exchange of messages between countries without revealing cryptologic systems, ex. Washington – Moscow hotline  Producing, distributing and destroying tapes was a burden and security risk, limiting use to military and diplomatic purposes  Examples of teletype one-time cipher machines: • US SIGTOT • Norway ETCRRM • Hagelin T-55 • German T-37 ICA • E. German T-304 • British BID-590 • Dutch ECOLEX • Canadian Rockex • Russian M100 • Czech SD1
  • 8. One-Time Pads 8  First used in 1923 by German Foreign Office  Used extensively by spies because the pads were easily concealed, other cipher devices were not needed and the cipher was unbreakable  Pads were often shrunk to a very small size and made of flammable material One-Time Pad: The Only Unbreakable Cipher One-time pad, microdot reader concealed in toy, found on spy entering Canada
  • 9. One-Time Pad: The Only Unbreakable Cipher 9 Other One-Time Devices  Hagelin incorporated one-time tape into some traditional pin and lug cipher machines, including the C-446-RT, CX-52-RT and handheld CD-57-RT  Hagelin also sold a traditional teletype one-time tape machine, the T-55  Some T-55’s included CX-52 pin and lug option, which is not a random one- time function, so it is breakable  Hagelin one-time tape machines were manual, but avoided the setting of pins, lugs and wheels Hagelin T-55 Hagelin CX-52-RT Hagelin C-442-RT
  • 10. Other One-Time Ciphers 10  During WW2, US SIGSALY voice encryption was the first digital voice cipher, using noise for one-time records  Since plaintext voice was mixed with a record, some writers erroneously report this as an analog cipher  Used by Churchill and Roosevelt in WW2 and never broken Random noise on records SIGSALY in NCM One-Time Pad: The Only Unbreakable Cipher
  • 11. One-Time Pad: The Only Unbreakable Cipher 11 History Rewritten Frank Miller  In 2011, Steven Bellovin, a Columbia University professor, discovered a prior invention of the one-time pad  Frank Miller, a Sacramento CA bank president, described the one-time pad in a book written in 1882  The book, “Telegraphic Code to Insure Privacy and Secrecy in the Transmission of Telegrams,” was written for banks, fewer than 200 books printed  During the Civil War, Miller worked for Col. Henry Steel Olcott, investigating fraud and corruption, including the use of ciphers  Miller’s book was a telegraphic code book and his explanation of using the one-time pad was very specific: “A banker in the West should prepare a list of irregular numbers to be called 'shift numbers', such as 483, 281, 175, 892, &c. The differences between such numbers must not be regular. When a shift-number has been applied, or used, it must be erased from the list and not be used again.”
  • 12. History Rewritten (twice?) 12 One-Time Pad: The Only Unbreakable Cipher Steven Bellovin  In 2013, Bellovin presented arguments that the one- time tape teletype was invented solely by Vernam, although he may not have understood the cryptologic significance  Mauborgne later codified the requirements for non- repetition, with collaboration from Parker Hitt and William F. Friedman  William F. Friedman’s work on breaking the two-tape system may have led him to his groundbreaking invention of the “index of coincidence”
  • 13. One-Time Pad: The Only Unbreakable Cipher 13 3 Vulnerabilities of One-Time Pads 1. Reuse of one-time pads, ex. Venona Project • In 1942, Russians had so many spies, they carbon-copied 35,000 pads • Of 1.5M total diplomatic messages sent (1942-48), 1M intercepted, 30,000 used duplicate pads, 2,900 partially decrypted • Most duplicate pads were used from 1942-45 • US decryption showed Russian spying on Manhattan Project, spies in almost every major military and diplomatic organization, including White House, OSS, MI6, etc. • 349 Americans mentioned, about half identified • Venona Project closed in 1980, declassified in 1995 Reuse of one-time tape, ex. Moscow – Canberra messages • In 1945, US discovered Russians used the same one-time tape for Moscow-Canberra and Moscow - Washington
  • 14. One-Time Pad: The Only Unbreakable Cipher 14 3 Vulnerabilities of One-Time Pads 2. Non-random pads, ex. German Foreign Office in WW2 • German Foreign Office used machine generated tapes, which were not random, for a system codenamed GEE • Used for high level diplomatic messages • The US solved this cipher in 1944, Germans continued to use GEE for another 10 years • Earliest intercepted message solved was from 1925
  • 15. 15 3 Vulnerabilities of One-Time Pads 3. Electronic emissions, ex. TEMPEST  First discovered by AT&T in 1943, electronic emissions from keyboards, printers, voice, etc can identify plaintext before encryption  Not limited to one-time teletype machines  Faint artifacts of plaintext travels through the air, signal wires, electric wires, plumbing and can be tapped for up to 20 miles  US exploited this capability to capture messages in the Berlin hub in 1955, tunneling under the Berlin wall to tap phone and teletype lines One-Time Pad: The Only Unbreakable Cipher
  • 16. Summary 16  One-time pads can be absolutely secure for high level messages  Allows countries to exchange messages without revealing cipher secrets  Burden of distributing and managing tapes limits usefulness  US discontinued use of SIGTOT in 1959, mainly due to Tempest  Ease of use and additional functionality of public key encryption supersedes use of one-time ciphers One-Time Pad: The Only Unbreakable Cipher  One-time pads may return to prominence when quantum cryptography is developed
  • 17. Download this Presentation One-Time Pad: The Only Unbreakable Cipher 17 You can download this powerpoint presentation here: CipherMachines.com/otp.ppt