SlideShare una empresa de Scribd logo
1 de 15
One Time Pad
(Vernam Cipher)




                  July 28, 2012
•   Patrick




                  CRYPTO
•   Rufus
•   Mark K.
•   Mark C.
•   Adams
•   Kelvin M.
                     1
One Time Pad
(Vernam Cipher)




                  July 28, 2012
                  CRYPTO
                     2
OTP History
• First described by Frank Miller in 1882 the one-time pad was
  re-invented in 1917 and patented a couple of years later. It is




                                                                    July 28, 2012
  derived from the Vernam cipher, named after Gilbert Vernam,
  one of its inventors.




                                                                    CRYPTO
• Used by spies of the former USSR (Russia) during the 1960s

• Used a stack of small very thin pages, each with a series
  of random numbers on them. After use, a page would be
  destroyed immediately

                                                                       3
OTP-Working Mechanism
• The encryption-key has at least the same length as the
  plaintext and consists of truely random numbers




                                                               July 28, 2012
• Each letter of the plaintext is 'mixed' with one element
  from the OTP
• This results in a ciphertext that has no relation with the




                                                               CRYPTO
  plaintext when the key is unknown. At the receiving end,
  the same OTP is used to retrieve the original plaintext




                                                                  4
OTP Rules
• The OTP should consist of truely random numbers




                                                           July 28, 2012
• Precisely two copies of the OTP should exist.




                                                           CRYPTO
• The OTP should only be used once.

• Both copies of the OTP are destroyed immediately after
  use.



                                                              5
Why OTP is Unbreakable
•  The key is atleast as long as the message
• The key is truly random (not auto-generated)




                                                           July 28, 2012
• Key and plain text calculated modulo 10/26/2
• Each key should only be used once & destroyed by




                                                           CRYPTO
  sender and receiver
• There should only be 2 copies of the key (1 for sender
  and 1 for receiver)




                                                              6
OTP Criticism
• Distribution of the key was a challenge
• Adding numbers to the plaintext manually, is a time-




                                                           July 28, 2012
  consuming task. It is therefore sometimes thought that
  OTPs are no longer considered practical




                                                           CRYPTO
• Counter: Improved computing power now




                                                              7
OTP Example
• Problem: Alice wishes to send the message "HELLO" to Bob
• ROE: Assume two pads of paper containing identical random




                                                                     July 28, 2012
  sequences of letters were somehow previously produced and
  securely issued to both
• Additional Info:Alice chooses the appropriate unused page




                                                                     CRYPTO
  from the pad.

• How: The way to do this is normally arranged for in advance,
  as for instance 'use the 12th sheet on 1 May', or 'use the next
  available sheet for the next message'. The material on the
  selected sheet is the key for this message. Each letter from the
  pad will be combined in a predetermined way with one letter of
  the message. It is common, but not required, to assign each
                                                                        8
  letter a numerical value: e.g. "A" is 0, "B" is 1, and so on.
OTP Example (Modulo26)
• Here, we combine the key and the message using
  modular addition.




                                                           July 28, 2012
• The numerical values of corresponding message and key




                                                           CRYPTO
  letters are added together, modulo 26.

• If key material begins with "XMCKL" and the message is
  "HELLO", then the coding would be……..




                                                              9
OTP Encryption




     CRYPTO   July 28, 2012
10
OTP Encryption [contd.]
• If a number is larger than 25, then the remainder after
  subtraction of 26 is taken in modular arithmetic fashion.




                                                              July 28, 2012
• This simply means that if your computations "go past" Z,




                                                              CRYPTO
  you start again at A.

• The ciphertext to be sent to Bob is thus "EQNVZ". Bob
  uses the matching key page and the same process, but
  in reverse, to obtain the plaintext.

• Here the key is subtracted from the ciphertext, again
  using modular arithmetic……                                  11
OTP Decryption




                                                             July 28, 2012
                                                             CRYPTO
• NB: If a number is negative then 26 is added to make the
  number positive                                            12
OTP Cryptanalysis
• Suppose Eve intercepts Alice's ciphertext: "EQNVZ".




                                                           July 28, 2012
• If Eve had infinite computing power, she would quickly
  find that the key "XMCKL" would produce the plaintext




                                                           CRYPTO
  "HELLO", but she would also find that the key "TQURI"
  would produce the plaintext "LATER"




                                                           13
OTP Cryptanalysis [contd]
• It is possible to "decrypt" out of the ciphertext any
  message whatsoever with the same number of




                                                              July 28, 2012
  characters, simply by using a different key, and there is
  no information in the ciphertext which will allow Eve to
  choose among the various possible readings of the




                                                              CRYPTO
  ciphertext

• Thus, OTP coined, the “Perfect Cipher”




                                                              14
Try This One:
• Message: COME




                                                                  July 28, 2012
• Key: BABY

• References:




                                                                  CRYPTO
http://www.cs.miami.edu/~burt/learning/Csc609.051/notes/02.html

http://www.cryptomuseum.com/crypto/otp.htm

http://practicalcryptography.com/ciphers/

http://en.wikipedia.org/wiki/One-time_pad                         15

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Transposition cipher
Transposition cipherTransposition cipher
Transposition cipher
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
One time Pad Encryption
One time Pad EncryptionOne time Pad Encryption
One time Pad Encryption
 
Cryptography
CryptographyCryptography
Cryptography
 
Public Key Encryption & Hash functions
Public Key Encryption & Hash functionsPublic Key Encryption & Hash functions
Public Key Encryption & Hash functions
 
cryptography
cryptographycryptography
cryptography
 
DES
DESDES
DES
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
ElGamal Encryption Algoritham.pptx
ElGamal Encryption Algoritham.pptxElGamal Encryption Algoritham.pptx
ElGamal Encryption Algoritham.pptx
 
Elliptical curve cryptography
Elliptical curve cryptographyElliptical curve cryptography
Elliptical curve cryptography
 
Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithms
 
3. The Data Encryption Standard (DES) and Alternatives
3. The Data Encryption Standard (DES) and Alternatives3. The Data Encryption Standard (DES) and Alternatives
3. The Data Encryption Standard (DES) and Alternatives
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
 
Cryptography
CryptographyCryptography
Cryptography
 
El Gamal Cryptosystem
El Gamal CryptosystemEl Gamal Cryptosystem
El Gamal Cryptosystem
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 

Último

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Último (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

One Time Pad Encryption Technique

  • 1. One Time Pad (Vernam Cipher) July 28, 2012 • Patrick CRYPTO • Rufus • Mark K. • Mark C. • Adams • Kelvin M. 1
  • 2. One Time Pad (Vernam Cipher) July 28, 2012 CRYPTO 2
  • 3. OTP History • First described by Frank Miller in 1882 the one-time pad was re-invented in 1917 and patented a couple of years later. It is July 28, 2012 derived from the Vernam cipher, named after Gilbert Vernam, one of its inventors. CRYPTO • Used by spies of the former USSR (Russia) during the 1960s • Used a stack of small very thin pages, each with a series of random numbers on them. After use, a page would be destroyed immediately 3
  • 4. OTP-Working Mechanism • The encryption-key has at least the same length as the plaintext and consists of truely random numbers July 28, 2012 • Each letter of the plaintext is 'mixed' with one element from the OTP • This results in a ciphertext that has no relation with the CRYPTO plaintext when the key is unknown. At the receiving end, the same OTP is used to retrieve the original plaintext 4
  • 5. OTP Rules • The OTP should consist of truely random numbers July 28, 2012 • Precisely two copies of the OTP should exist. CRYPTO • The OTP should only be used once. • Both copies of the OTP are destroyed immediately after use. 5
  • 6. Why OTP is Unbreakable • The key is atleast as long as the message • The key is truly random (not auto-generated) July 28, 2012 • Key and plain text calculated modulo 10/26/2 • Each key should only be used once & destroyed by CRYPTO sender and receiver • There should only be 2 copies of the key (1 for sender and 1 for receiver) 6
  • 7. OTP Criticism • Distribution of the key was a challenge • Adding numbers to the plaintext manually, is a time- July 28, 2012 consuming task. It is therefore sometimes thought that OTPs are no longer considered practical CRYPTO • Counter: Improved computing power now 7
  • 8. OTP Example • Problem: Alice wishes to send the message "HELLO" to Bob • ROE: Assume two pads of paper containing identical random July 28, 2012 sequences of letters were somehow previously produced and securely issued to both • Additional Info:Alice chooses the appropriate unused page CRYPTO from the pad. • How: The way to do this is normally arranged for in advance, as for instance 'use the 12th sheet on 1 May', or 'use the next available sheet for the next message'. The material on the selected sheet is the key for this message. Each letter from the pad will be combined in a predetermined way with one letter of the message. It is common, but not required, to assign each 8 letter a numerical value: e.g. "A" is 0, "B" is 1, and so on.
  • 9. OTP Example (Modulo26) • Here, we combine the key and the message using modular addition. July 28, 2012 • The numerical values of corresponding message and key CRYPTO letters are added together, modulo 26. • If key material begins with "XMCKL" and the message is "HELLO", then the coding would be…….. 9
  • 10. OTP Encryption CRYPTO July 28, 2012 10
  • 11. OTP Encryption [contd.] • If a number is larger than 25, then the remainder after subtraction of 26 is taken in modular arithmetic fashion. July 28, 2012 • This simply means that if your computations "go past" Z, CRYPTO you start again at A. • The ciphertext to be sent to Bob is thus "EQNVZ". Bob uses the matching key page and the same process, but in reverse, to obtain the plaintext. • Here the key is subtracted from the ciphertext, again using modular arithmetic…… 11
  • 12. OTP Decryption July 28, 2012 CRYPTO • NB: If a number is negative then 26 is added to make the number positive 12
  • 13. OTP Cryptanalysis • Suppose Eve intercepts Alice's ciphertext: "EQNVZ". July 28, 2012 • If Eve had infinite computing power, she would quickly find that the key "XMCKL" would produce the plaintext CRYPTO "HELLO", but she would also find that the key "TQURI" would produce the plaintext "LATER" 13
  • 14. OTP Cryptanalysis [contd] • It is possible to "decrypt" out of the ciphertext any message whatsoever with the same number of July 28, 2012 characters, simply by using a different key, and there is no information in the ciphertext which will allow Eve to choose among the various possible readings of the CRYPTO ciphertext • Thus, OTP coined, the “Perfect Cipher” 14
  • 15. Try This One: • Message: COME July 28, 2012 • Key: BABY • References: CRYPTO http://www.cs.miami.edu/~burt/learning/Csc609.051/notes/02.html http://www.cryptomuseum.com/crypto/otp.htm http://practicalcryptography.com/ciphers/ http://en.wikipedia.org/wiki/One-time_pad 15