SlideShare una empresa de Scribd logo
1 de 25
Descargar para leer sin conexión
One Time Pad (OTP) Usage SSG Ryan J. Gomez – U.S. Army Army Basic Instructors Course   "If you think cryptography can solve your problem, then you don't understand your problem and you don't understand cryptography."    -- Bruce Schneier
Terminal Learning Objective Terminal Learning Objective: Action: Correctly identify and utilize a OTP. Condition: Given a OTP, correct keying material, and scratch paper & writing utensil in a classroom environment. Standard: Decrypt and Encrypt a OTP message.
Safety, Risk, and Environmental Considerations Safety Requirements: None Risk Assessment: Low Environmental Considerations: None
Evaluation Evaluation: Correctly encrypt and decrypt a message using an OTP.
Enabling Learning Objective (ELO) ELO A: Cryptographic history and terminology.
History of Cryptography and OTP Usage * The earliest methods of cryptography were altered hieroglyphics attempting to pass secret messages. * WWII messages were primarily mechanically generated. * Modern cryptography utilizes mathematically based encryption.
Overview of Cryptography  Terminology ,[object Object],[object Object],[object Object],[object Object]
Overview of Cryptography  Terminology (Cont.) ,[object Object],[object Object],[object Object],[object Object]
Enabling Learning Objective ,[object Object]
Information Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Information Security ,[object Object],[object Object],[object Object],[object Object],[object Object]
Types of Cryptographic Systems Secret Codes ,[object Object],Code Phrase True Meaning My coffee is cold Pass the cream Launch the missiles Don’t launch the missiles
Types of Cryptographic Systems Ciphers ,[object Object],[object Object],[object Object],A  B  C  D  E  F  G  H  I  J  K  L  M  1  2  3  4  5  6  7  8  9  A  B C  . . .
Types of Cryptographic Systems One-Time Pads ,[object Object],[object Object],[object Object],Decrypted Text 14  07  09  06  10  02  25  13  17  08  15 One-Time Pad - Shift each encrypted letter x places to the right A B C D E F G H I J K L M N O P Q R S T U V W X Y Z fazmyqbgnke Encrypted Message This is a test
One Time Pad The above is an example of a page from a standard one time pad.  The encryption & decryption keys are impossible to decipher when generated using entirely random keys.
Enabling Learning Objective ,[object Object]
OTPs in the COE ,[object Object],[object Object],[object Object]
Check on Learning ,[object Object],[object Object],[object Object]
One Time Pad ,[object Object]
Encrypt and Decrypt an OTP Message ,[object Object],[object Object],[object Object]
Encrypt an OTP Message ,[object Object],[object Object],[object Object],[object Object],[object Object]
Decrypt an OTP Message ,[object Object],[object Object]
Example ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Demonstration ,[object Object],[object Object],Today's OTP: PQYQ FWYC XQVV EYPL GJNS WCQI PPXR LQVZ AZSN ZEVL AJWA XHUN GUWU EOTC RMGP WSRE Today's Messages Encrypt: PAININBRAIN Decrypt: LYLD NJEN LB A B C D E F G H I 1 2 3 4 5 6 7 8 9 J K L M N O P Q R 10 11 12 13 14 15 16 17 18 S T U V W X Y Z 19 20 21 22 23 24 25 26
Summary ,[object Object],[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

Cryptology - Antônio Lacerda
Cryptology - Antônio LacerdaCryptology - Antônio Lacerda
Cryptology - Antônio LacerdaRodrigo Almeida
 
Cryptography for developers
Cryptography for developersCryptography for developers
Cryptography for developersKai Koenig
 
Cryptography ppt ,computer system security. PPT
Cryptography ppt ,computer system security. PPTCryptography ppt ,computer system security. PPT
Cryptography ppt ,computer system security. PPTARYANUNIVERSE
 
Vladyslav Hamolia "How to choose ASR (automatic speech recognition) system"
Vladyslav Hamolia "How to choose ASR (automatic speech recognition) system"Vladyslav Hamolia "How to choose ASR (automatic speech recognition) system"
Vladyslav Hamolia "How to choose ASR (automatic speech recognition) system"Lviv Startup Club
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation finaladrigee12
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & CryptographyArun ACE
 
Cypher technique
Cypher techniqueCypher technique
Cypher techniqueZubair CH
 
Cryptography Presentation
Cryptography PresentationCryptography Presentation
Cryptography PresentationDonte Francis
 
Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )Anas Rock
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)newbie2019
 
Cryptography and encryption
Cryptography and  encryptionCryptography and  encryption
Cryptography and encryptionAncy Mariam Babu
 

La actualidad más candente (20)

Cryptology - Antônio Lacerda
Cryptology - Antônio LacerdaCryptology - Antônio Lacerda
Cryptology - Antônio Lacerda
 
Applied Cryptography
Applied CryptographyApplied Cryptography
Applied Cryptography
 
Cryptography for developers
Cryptography for developersCryptography for developers
Cryptography for developers
 
Cryptography ppt ,computer system security. PPT
Cryptography ppt ,computer system security. PPTCryptography ppt ,computer system security. PPT
Cryptography ppt ,computer system security. PPT
 
Vladyslav Hamolia "How to choose ASR (automatic speech recognition) system"
Vladyslav Hamolia "How to choose ASR (automatic speech recognition) system"Vladyslav Hamolia "How to choose ASR (automatic speech recognition) system"
Vladyslav Hamolia "How to choose ASR (automatic speech recognition) system"
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
 
Classical Encryption
Classical EncryptionClassical Encryption
Classical Encryption
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Classical Encryption Techniques
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
 
Cypher technique
Cypher techniqueCypher technique
Cypher technique
 
Cryptography Presentation
Cryptography PresentationCryptography Presentation
Cryptography Presentation
 
Cryptography basices
Cryptography basicesCryptography basices
Cryptography basices
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding informationCryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding information
 
Cryptography
CryptographyCryptography
Cryptography
 
Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)
 
Cryptography and encryption
Cryptography and  encryptionCryptography and  encryption
Cryptography and encryption
 
Pycon Korea 2020
Pycon Korea 2020 Pycon Korea 2020
Pycon Korea 2020
 

Similar a Otp2

Documents NETW206 W1 Ilab Report Essay
Documents NETW206 W1 Ilab Report EssayDocuments NETW206 W1 Ilab Report Essay
Documents NETW206 W1 Ilab Report EssayKimberly Thomas
 
sabith.pptx
sabith.pptxsabith.pptx
sabith.pptxsabith15
 
Data Protection Techniques and Cryptography
Data Protection Techniques and CryptographyData Protection Techniques and Cryptography
Data Protection Techniques and CryptographyTalha SAVAS
 
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...JAINAM KAPADIYA
 
AES1210 Unit 3 Assignment 1
AES1210 Unit 3 Assignment 1AES1210 Unit 3 Assignment 1
AES1210 Unit 3 Assignment 1Sandy Harwell
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overviewppd1961
 
Cryptography chap#6.pptx
Cryptography chap#6.pptxCryptography chap#6.pptx
Cryptography chap#6.pptxHamnaMalik31
 
ch09_rsa_nemo.ppt
ch09_rsa_nemo.pptch09_rsa_nemo.ppt
ch09_rsa_nemo.pptChandraB15
 
Introduction to encryption
Introduction to encryptionIntroduction to encryption
Introduction to encryptionfaffyman
 
Cryptography- "A Black Art"
Cryptography- "A Black Art"Cryptography- "A Black Art"
Cryptography- "A Black Art"Aditya Raina
 
Senior Research Final Draft3
Senior Research Final Draft3Senior Research Final Draft3
Senior Research Final Draft3Coleman Gorham
 

Similar a Otp2 (20)

doc3.pdf
doc3.pdfdoc3.pdf
doc3.pdf
 
paper3.pdf
paper3.pdfpaper3.pdf
paper3.pdf
 
sheet3.pdf
sheet3.pdfsheet3.pdf
sheet3.pdf
 
paper10.pdf
paper10.pdfpaper10.pdf
paper10.pdf
 
lecture2.pdf
lecture2.pdflecture2.pdf
lecture2.pdf
 
Documents NETW206 W1 Ilab Report Essay
Documents NETW206 W1 Ilab Report EssayDocuments NETW206 W1 Ilab Report Essay
Documents NETW206 W1 Ilab Report Essay
 
sabith.pptx
sabith.pptxsabith.pptx
sabith.pptx
 
Introduction to cryptography
Introduction to cryptographyIntroduction to cryptography
Introduction to cryptography
 
Ch02...1
Ch02...1Ch02...1
Ch02...1
 
Data Protection Techniques and Cryptography
Data Protection Techniques and CryptographyData Protection Techniques and Cryptography
Data Protection Techniques and Cryptography
 
SMS Encryption Using One-Time Pad Cipher
SMS Encryption Using One-Time Pad CipherSMS Encryption Using One-Time Pad Cipher
SMS Encryption Using One-Time Pad Cipher
 
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
 
AES1210 Unit 3 Assignment 1
AES1210 Unit 3 Assignment 1AES1210 Unit 3 Assignment 1
AES1210 Unit 3 Assignment 1
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
 
Cryptography chap#6.pptx
Cryptography chap#6.pptxCryptography chap#6.pptx
Cryptography chap#6.pptx
 
ch09_rsa_nemo.ppt
ch09_rsa_nemo.pptch09_rsa_nemo.ppt
ch09_rsa_nemo.ppt
 
Ppt ns
Ppt nsPpt ns
Ppt ns
 
Introduction to encryption
Introduction to encryptionIntroduction to encryption
Introduction to encryption
 
Cryptography- "A Black Art"
Cryptography- "A Black Art"Cryptography- "A Black Art"
Cryptography- "A Black Art"
 
Senior Research Final Draft3
Senior Research Final Draft3Senior Research Final Draft3
Senior Research Final Draft3
 

Otp2

  • 1. One Time Pad (OTP) Usage SSG Ryan J. Gomez – U.S. Army Army Basic Instructors Course "If you think cryptography can solve your problem, then you don't understand your problem and you don't understand cryptography." -- Bruce Schneier
  • 2. Terminal Learning Objective Terminal Learning Objective: Action: Correctly identify and utilize a OTP. Condition: Given a OTP, correct keying material, and scratch paper & writing utensil in a classroom environment. Standard: Decrypt and Encrypt a OTP message.
  • 3. Safety, Risk, and Environmental Considerations Safety Requirements: None Risk Assessment: Low Environmental Considerations: None
  • 4. Evaluation Evaluation: Correctly encrypt and decrypt a message using an OTP.
  • 5. Enabling Learning Objective (ELO) ELO A: Cryptographic history and terminology.
  • 6. History of Cryptography and OTP Usage * The earliest methods of cryptography were altered hieroglyphics attempting to pass secret messages. * WWII messages were primarily mechanically generated. * Modern cryptography utilizes mathematically based encryption.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. One Time Pad The above is an example of a page from a standard one time pad. The encryption & decryption keys are impossible to decipher when generated using entirely random keys.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.