SlideShare uma empresa Scribd logo
1 de 15
One Time Pad
(Vernam Cipher)




                  July 28, 2012
•   Patrick




                  CRYPTO
•   Rufus
•   Mark K.
•   Mark C.
•   Adams
•   Kelvin M.
                     1
One Time Pad
(Vernam Cipher)




                  July 28, 2012
                  CRYPTO
                     2
OTP History
• First described by Frank Miller in 1882 the one-time pad was
  re-invented in 1917 and patented a couple of years later. It is




                                                                    July 28, 2012
  derived from the Vernam cipher, named after Gilbert Vernam,
  one of its inventors.




                                                                    CRYPTO
• Used by spies of the former USSR (Russia) during the 1960s

• Used a stack of small very thin pages, each with a series
  of random numbers on them. After use, a page would be
  destroyed immediately

                                                                       3
OTP-Working Mechanism
• The encryption-key has at least the same length as the
  plaintext and consists of truely random numbers




                                                               July 28, 2012
• Each letter of the plaintext is 'mixed' with one element
  from the OTP
• This results in a ciphertext that has no relation with the




                                                               CRYPTO
  plaintext when the key is unknown. At the receiving end,
  the same OTP is used to retrieve the original plaintext




                                                                  4
OTP Rules
• The OTP should consist of truely random numbers




                                                           July 28, 2012
• Precisely two copies of the OTP should exist.




                                                           CRYPTO
• The OTP should only be used once.

• Both copies of the OTP are destroyed immediately after
  use.



                                                              5
Why OTP is Unbreakable
•  The key is atleast as long as the message
• The key is truly random (not auto-generated)




                                                           July 28, 2012
• Key and plain text calculated modulo 10/26/2
• Each key should only be used once & destroyed by




                                                           CRYPTO
  sender and receiver
• There should only be 2 copies of the key (1 for sender
  and 1 for receiver)




                                                              6
OTP Criticism
• Distribution of the key was a challenge
• Adding numbers to the plaintext manually, is a time-




                                                           July 28, 2012
  consuming task. It is therefore sometimes thought that
  OTPs are no longer considered practical




                                                           CRYPTO
• Counter: Improved computing power now




                                                              7
OTP Example
• Problem: Alice wishes to send the message "HELLO" to Bob
• ROE: Assume two pads of paper containing identical random




                                                                     July 28, 2012
  sequences of letters were somehow previously produced and
  securely issued to both
• Additional Info:Alice chooses the appropriate unused page




                                                                     CRYPTO
  from the pad.

• How: The way to do this is normally arranged for in advance,
  as for instance 'use the 12th sheet on 1 May', or 'use the next
  available sheet for the next message'. The material on the
  selected sheet is the key for this message. Each letter from the
  pad will be combined in a predetermined way with one letter of
  the message. It is common, but not required, to assign each
                                                                        8
  letter a numerical value: e.g. "A" is 0, "B" is 1, and so on.
OTP Example (Modulo26)
• Here, we combine the key and the message using
  modular addition.




                                                           July 28, 2012
• The numerical values of corresponding message and key




                                                           CRYPTO
  letters are added together, modulo 26.

• If key material begins with "XMCKL" and the message is
  "HELLO", then the coding would be……..




                                                              9
OTP Encryption




     CRYPTO   July 28, 2012
10
OTP Encryption [contd.]
• If a number is larger than 25, then the remainder after
  subtraction of 26 is taken in modular arithmetic fashion.




                                                              July 28, 2012
• This simply means that if your computations "go past" Z,




                                                              CRYPTO
  you start again at A.

• The ciphertext to be sent to Bob is thus "EQNVZ". Bob
  uses the matching key page and the same process, but
  in reverse, to obtain the plaintext.

• Here the key is subtracted from the ciphertext, again
  using modular arithmetic……                                  11
OTP Decryption




                                                             July 28, 2012
                                                             CRYPTO
• NB: If a number is negative then 26 is added to make the
  number positive                                            12
OTP Cryptanalysis
• Suppose Eve intercepts Alice's ciphertext: "EQNVZ".




                                                           July 28, 2012
• If Eve had infinite computing power, she would quickly
  find that the key "XMCKL" would produce the plaintext




                                                           CRYPTO
  "HELLO", but she would also find that the key "TQURI"
  would produce the plaintext "LATER"




                                                           13
OTP Cryptanalysis [contd]
• It is possible to "decrypt" out of the ciphertext any
  message whatsoever with the same number of




                                                              July 28, 2012
  characters, simply by using a different key, and there is
  no information in the ciphertext which will allow Eve to
  choose among the various possible readings of the




                                                              CRYPTO
  ciphertext

• Thus, OTP coined, the “Perfect Cipher”




                                                              14
Try This One:
• Message: COME




                                                                  July 28, 2012
• Key: BABY

• References:




                                                                  CRYPTO
http://www.cs.miami.edu/~burt/learning/Csc609.051/notes/02.html

http://www.cryptomuseum.com/crypto/otp.htm

http://practicalcryptography.com/ciphers/

http://en.wikipedia.org/wiki/One-time_pad                         15

Mais conteúdo relacionado

Mais procurados

Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)Haris Ahmed
 
Applications of-linear-algebra-hill-cipher
Applications of-linear-algebra-hill-cipherApplications of-linear-algebra-hill-cipher
Applications of-linear-algebra-hill-cipherAashirwad Kashyap
 
Topic20 The RC4 Algorithm.pptx
Topic20 The RC4 Algorithm.pptxTopic20 The RC4 Algorithm.pptx
Topic20 The RC4 Algorithm.pptxUrjaDhabarde
 
Substitution cipher and Its Cryptanalysis
Substitution cipher and Its CryptanalysisSubstitution cipher and Its Cryptanalysis
Substitution cipher and Its CryptanalysisSunil Meena
 
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere CipherCaesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere CipherMona Rajput
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniquesMohd Arif
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithmsRashmi Burugupalli
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationsarhadisoftengg
 
Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Hardik Manocha
 
Key distribution code.ppt
Key distribution code.pptKey distribution code.ppt
Key distribution code.pptPrabhat Kumar
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Jayanth Dwijesh H P
 

Mais procurados (20)

Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 
Applications of-linear-algebra-hill-cipher
Applications of-linear-algebra-hill-cipherApplications of-linear-algebra-hill-cipher
Applications of-linear-algebra-hill-cipher
 
Topic20 The RC4 Algorithm.pptx
Topic20 The RC4 Algorithm.pptxTopic20 The RC4 Algorithm.pptx
Topic20 The RC4 Algorithm.pptx
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Substitution cipher and Its Cryptanalysis
Substitution cipher and Its CryptanalysisSubstitution cipher and Its Cryptanalysis
Substitution cipher and Its Cryptanalysis
 
hill cipher
hill cipherhill cipher
hill cipher
 
Cryptography
CryptographyCryptography
Cryptography
 
Modern Cryptography
Modern CryptographyModern Cryptography
Modern Cryptography
 
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere CipherCaesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
 
Cryptography
CryptographyCryptography
Cryptography
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniques
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
IP security
IP securityIP security
IP security
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES)
 
Key distribution code.ppt
Key distribution code.pptKey distribution code.ppt
Key distribution code.ppt
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
 

Último

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Último (20)

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

One Time Pad Encryption Technique

  • 1. One Time Pad (Vernam Cipher) July 28, 2012 • Patrick CRYPTO • Rufus • Mark K. • Mark C. • Adams • Kelvin M. 1
  • 2. One Time Pad (Vernam Cipher) July 28, 2012 CRYPTO 2
  • 3. OTP History • First described by Frank Miller in 1882 the one-time pad was re-invented in 1917 and patented a couple of years later. It is July 28, 2012 derived from the Vernam cipher, named after Gilbert Vernam, one of its inventors. CRYPTO • Used by spies of the former USSR (Russia) during the 1960s • Used a stack of small very thin pages, each with a series of random numbers on them. After use, a page would be destroyed immediately 3
  • 4. OTP-Working Mechanism • The encryption-key has at least the same length as the plaintext and consists of truely random numbers July 28, 2012 • Each letter of the plaintext is 'mixed' with one element from the OTP • This results in a ciphertext that has no relation with the CRYPTO plaintext when the key is unknown. At the receiving end, the same OTP is used to retrieve the original plaintext 4
  • 5. OTP Rules • The OTP should consist of truely random numbers July 28, 2012 • Precisely two copies of the OTP should exist. CRYPTO • The OTP should only be used once. • Both copies of the OTP are destroyed immediately after use. 5
  • 6. Why OTP is Unbreakable • The key is atleast as long as the message • The key is truly random (not auto-generated) July 28, 2012 • Key and plain text calculated modulo 10/26/2 • Each key should only be used once & destroyed by CRYPTO sender and receiver • There should only be 2 copies of the key (1 for sender and 1 for receiver) 6
  • 7. OTP Criticism • Distribution of the key was a challenge • Adding numbers to the plaintext manually, is a time- July 28, 2012 consuming task. It is therefore sometimes thought that OTPs are no longer considered practical CRYPTO • Counter: Improved computing power now 7
  • 8. OTP Example • Problem: Alice wishes to send the message "HELLO" to Bob • ROE: Assume two pads of paper containing identical random July 28, 2012 sequences of letters were somehow previously produced and securely issued to both • Additional Info:Alice chooses the appropriate unused page CRYPTO from the pad. • How: The way to do this is normally arranged for in advance, as for instance 'use the 12th sheet on 1 May', or 'use the next available sheet for the next message'. The material on the selected sheet is the key for this message. Each letter from the pad will be combined in a predetermined way with one letter of the message. It is common, but not required, to assign each 8 letter a numerical value: e.g. "A" is 0, "B" is 1, and so on.
  • 9. OTP Example (Modulo26) • Here, we combine the key and the message using modular addition. July 28, 2012 • The numerical values of corresponding message and key CRYPTO letters are added together, modulo 26. • If key material begins with "XMCKL" and the message is "HELLO", then the coding would be…….. 9
  • 10. OTP Encryption CRYPTO July 28, 2012 10
  • 11. OTP Encryption [contd.] • If a number is larger than 25, then the remainder after subtraction of 26 is taken in modular arithmetic fashion. July 28, 2012 • This simply means that if your computations "go past" Z, CRYPTO you start again at A. • The ciphertext to be sent to Bob is thus "EQNVZ". Bob uses the matching key page and the same process, but in reverse, to obtain the plaintext. • Here the key is subtracted from the ciphertext, again using modular arithmetic…… 11
  • 12. OTP Decryption July 28, 2012 CRYPTO • NB: If a number is negative then 26 is added to make the number positive 12
  • 13. OTP Cryptanalysis • Suppose Eve intercepts Alice's ciphertext: "EQNVZ". July 28, 2012 • If Eve had infinite computing power, she would quickly find that the key "XMCKL" would produce the plaintext CRYPTO "HELLO", but she would also find that the key "TQURI" would produce the plaintext "LATER" 13
  • 14. OTP Cryptanalysis [contd] • It is possible to "decrypt" out of the ciphertext any message whatsoever with the same number of July 28, 2012 characters, simply by using a different key, and there is no information in the ciphertext which will allow Eve to choose among the various possible readings of the CRYPTO ciphertext • Thus, OTP coined, the “Perfect Cipher” 14
  • 15. Try This One: • Message: COME July 28, 2012 • Key: BABY • References: CRYPTO http://www.cs.miami.edu/~burt/learning/Csc609.051/notes/02.html http://www.cryptomuseum.com/crypto/otp.htm http://practicalcryptography.com/ciphers/ http://en.wikipedia.org/wiki/One-time_pad 15