3
Most read
8
Most read
10
Most read
One Time Pad
(Vernam Cipher)




                  July 28, 2012
•   Patrick




                  CRYPTO
•   Rufus
•   Mark K.
•   Mark C.
•   Adams
•   Kelvin M.
                     1
One Time Pad
(Vernam Cipher)




                  July 28, 2012
                  CRYPTO
                     2
OTP History
• First described by Frank Miller in 1882 the one-time pad was
  re-invented in 1917 and patented a couple of years later. It is




                                                                    July 28, 2012
  derived from the Vernam cipher, named after Gilbert Vernam,
  one of its inventors.




                                                                    CRYPTO
• Used by spies of the former USSR (Russia) during the 1960s

• Used a stack of small very thin pages, each with a series
  of random numbers on them. After use, a page would be
  destroyed immediately

                                                                       3
OTP-Working Mechanism
• The encryption-key has at least the same length as the
  plaintext and consists of truely random numbers




                                                               July 28, 2012
• Each letter of the plaintext is 'mixed' with one element
  from the OTP
• This results in a ciphertext that has no relation with the




                                                               CRYPTO
  plaintext when the key is unknown. At the receiving end,
  the same OTP is used to retrieve the original plaintext




                                                                  4
OTP Rules
• The OTP should consist of truely random numbers




                                                           July 28, 2012
• Precisely two copies of the OTP should exist.




                                                           CRYPTO
• The OTP should only be used once.

• Both copies of the OTP are destroyed immediately after
  use.



                                                              5
Why OTP is Unbreakable
•  The key is atleast as long as the message
• The key is truly random (not auto-generated)




                                                           July 28, 2012
• Key and plain text calculated modulo 10/26/2
• Each key should only be used once & destroyed by




                                                           CRYPTO
  sender and receiver
• There should only be 2 copies of the key (1 for sender
  and 1 for receiver)




                                                              6
OTP Criticism
• Distribution of the key was a challenge
• Adding numbers to the plaintext manually, is a time-




                                                           July 28, 2012
  consuming task. It is therefore sometimes thought that
  OTPs are no longer considered practical




                                                           CRYPTO
• Counter: Improved computing power now




                                                              7
OTP Example
• Problem: Alice wishes to send the message "HELLO" to Bob
• ROE: Assume two pads of paper containing identical random




                                                                     July 28, 2012
  sequences of letters were somehow previously produced and
  securely issued to both
• Additional Info:Alice chooses the appropriate unused page




                                                                     CRYPTO
  from the pad.

• How: The way to do this is normally arranged for in advance,
  as for instance 'use the 12th sheet on 1 May', or 'use the next
  available sheet for the next message'. The material on the
  selected sheet is the key for this message. Each letter from the
  pad will be combined in a predetermined way with one letter of
  the message. It is common, but not required, to assign each
                                                                        8
  letter a numerical value: e.g. "A" is 0, "B" is 1, and so on.
OTP Example (Modulo26)
• Here, we combine the key and the message using
  modular addition.




                                                           July 28, 2012
• The numerical values of corresponding message and key




                                                           CRYPTO
  letters are added together, modulo 26.

• If key material begins with "XMCKL" and the message is
  "HELLO", then the coding would be……..




                                                              9
OTP Encryption




     CRYPTO   July 28, 2012
10
OTP Encryption [contd.]
• If a number is larger than 25, then the remainder after
  subtraction of 26 is taken in modular arithmetic fashion.




                                                              July 28, 2012
• This simply means that if your computations "go past" Z,




                                                              CRYPTO
  you start again at A.

• The ciphertext to be sent to Bob is thus "EQNVZ". Bob
  uses the matching key page and the same process, but
  in reverse, to obtain the plaintext.

• Here the key is subtracted from the ciphertext, again
  using modular arithmetic……                                  11
OTP Decryption




                                                             July 28, 2012
                                                             CRYPTO
• NB: If a number is negative then 26 is added to make the
  number positive                                            12
OTP Cryptanalysis
• Suppose Eve intercepts Alice's ciphertext: "EQNVZ".




                                                           July 28, 2012
• If Eve had infinite computing power, she would quickly
  find that the key "XMCKL" would produce the plaintext




                                                           CRYPTO
  "HELLO", but she would also find that the key "TQURI"
  would produce the plaintext "LATER"




                                                           13
OTP Cryptanalysis [contd]
• It is possible to "decrypt" out of the ciphertext any
  message whatsoever with the same number of




                                                              July 28, 2012
  characters, simply by using a different key, and there is
  no information in the ciphertext which will allow Eve to
  choose among the various possible readings of the




                                                              CRYPTO
  ciphertext

• Thus, OTP coined, the “Perfect Cipher”




                                                              14
Try This One:
• Message: COME




                                                                  July 28, 2012
• Key: BABY

• References:




                                                                  CRYPTO
http://www.cs.miami.edu/~burt/learning/Csc609.051/notes/02.html

http://www.cryptomuseum.com/crypto/otp.htm

http://practicalcryptography.com/ciphers/

http://en.wikipedia.org/wiki/One-time_pad                         15

More Related Content

PPTX
One time Pad Encryption
PPTX
Transposition cipher techniques
PPT
Network Security and Cryptography
PPTX
Activity playfair cipher.pptx
PDF
SYMMETRIC CRYPTOGRAPHY
PPTX
MAC-Message Authentication Codes
PPTX
Cryptology
PPT
Diffie-hellman algorithm
One time Pad Encryption
Transposition cipher techniques
Network Security and Cryptography
Activity playfair cipher.pptx
SYMMETRIC CRYPTOGRAPHY
MAC-Message Authentication Codes
Cryptology
Diffie-hellman algorithm

What's hot (20)

ODP
One-Time Pad Encryption
PDF
Introduction to Cryptography
PPTX
Diffie hellman key exchange algorithm
PPT
Cryptography and Network Security William Stallings Lawrie Brown
PPTX
Digital signature(Cryptography)
PDF
Triple Data Encryption Standard (t-DES)
PPTX
Hash Function
PPT
block ciphers
PPT
Block Cipher and its Design Principles
PPTX
Cryptography
PPTX
Topic1 substitution transposition-techniques
PPTX
Confusion and Diffusion.pptx
PPT
Caesar cipher
PPT
RSA Algorithm - Public Key Cryptography
PPTX
Cryptography
PPTX
Encryption algorithms
PDF
symmetric key encryption algorithms
PPTX
Cryptography
PPTX
Cryptography
One-Time Pad Encryption
Introduction to Cryptography
Diffie hellman key exchange algorithm
Cryptography and Network Security William Stallings Lawrie Brown
Digital signature(Cryptography)
Triple Data Encryption Standard (t-DES)
Hash Function
block ciphers
Block Cipher and its Design Principles
Cryptography
Topic1 substitution transposition-techniques
Confusion and Diffusion.pptx
Caesar cipher
RSA Algorithm - Public Key Cryptography
Cryptography
Encryption algorithms
symmetric key encryption algorithms
Cryptography
Cryptography
Ad

Similar to One Time Pad Encryption Technique (20)

PPT
Otp
PPT
Otp2
PPTX
Lecture 2
PPT
Cryptography
PPT
Traditional symmetric-key cipher
PPT
Cipher techniques
DOCX
Number Theory In Cryptography
PPTX
TOPIC 10 - CRYPTOGRAPHY [REPORTED BY PUSTA].pptx
DOCX
Number Theory In Cryptography
PPT
Crypt
PDF
Image Encryption Using Advanced Hill Cipher Algorithm
PDF
2 classical cryptosystems
ODP
Network Security Topic 4 cryptography2
PDF
Alice & bob public key cryptography 101 - uncon dpc
PPTX
CS8792 - Cryptography and Network Security
PDF
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
PPTX
Introduction to cryptography part2-final
PDF
Cryptography System for Online Communication Using Polyalphabetic Substitutio...
PDF
Mat 140 Cryptology Day 1 Presentation
PDF
Computer Security (Cryptography) Ch03
Otp
Otp2
Lecture 2
Cryptography
Traditional symmetric-key cipher
Cipher techniques
Number Theory In Cryptography
TOPIC 10 - CRYPTOGRAPHY [REPORTED BY PUSTA].pptx
Number Theory In Cryptography
Crypt
Image Encryption Using Advanced Hill Cipher Algorithm
2 classical cryptosystems
Network Security Topic 4 cryptography2
Alice & bob public key cryptography 101 - uncon dpc
CS8792 - Cryptography and Network Security
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
Introduction to cryptography part2-final
Cryptography System for Online Communication Using Polyalphabetic Substitutio...
Mat 140 Cryptology Day 1 Presentation
Computer Security (Cryptography) Ch03
Ad

Recently uploaded (20)

PDF
GDG Cloud Southlake #45: Patrick Debois: The Impact of GenAI on Development a...
PPTX
From Curiosity to ROI — Cost-Benefit Analysis of Agentic Automation [3/6]
PDF
Intravenous drug administration application for pediatric patients via augmen...
PDF
State of AI in Business 2025 - MIT NANDA
PPTX
AQUEEL MUSHTAQUE FAKIH COMPUTER CENTER .
PDF
Slides World Game (s) Great Redesign Eco Economic Epochs.pdf
PDF
Uncertainty-aware contextual multi-armed bandits for recommendations in e-com...
PDF
Child-friendly e-learning for artificial intelligence education in Indonesia:...
PDF
ELLIE29.pdfWETWETAWTAWETAETAETERTRTERTER
PDF
Fitaura: AI & Machine Learning Powered Fitness Tracker
PDF
Examining Bias in AI Generated News Content.pdf
PPTX
Report in SIP_Distance_Learning_Technology_Impact.pptx
PPTX
From XAI to XEE through Influence and Provenance.Controlling model fairness o...
PDF
FASHION-DRIVEN TEXTILES AS A CRYSTAL OF A NEW STREAM FOR STAKEHOLDER CAPITALI...
PDF
【AI論文解説】高速・高品質な生成を実現するFlow Map Models(Part 1~3)
PPTX
Slides World Game (s) Great Redesign Eco Economic Epochs.pptx
PPTX
Rise of the Digital Control Grid Zeee Media and Hope and Tivon FTWProject.com
PDF
Optimizing bioinformatics applications: a novel approach with human protein d...
PDF
Advancements in abstractive text summarization: a deep learning approach
PDF
Human Computer Interaction Miterm Lesson
GDG Cloud Southlake #45: Patrick Debois: The Impact of GenAI on Development a...
From Curiosity to ROI — Cost-Benefit Analysis of Agentic Automation [3/6]
Intravenous drug administration application for pediatric patients via augmen...
State of AI in Business 2025 - MIT NANDA
AQUEEL MUSHTAQUE FAKIH COMPUTER CENTER .
Slides World Game (s) Great Redesign Eco Economic Epochs.pdf
Uncertainty-aware contextual multi-armed bandits for recommendations in e-com...
Child-friendly e-learning for artificial intelligence education in Indonesia:...
ELLIE29.pdfWETWETAWTAWETAETAETERTRTERTER
Fitaura: AI & Machine Learning Powered Fitness Tracker
Examining Bias in AI Generated News Content.pdf
Report in SIP_Distance_Learning_Technology_Impact.pptx
From XAI to XEE through Influence and Provenance.Controlling model fairness o...
FASHION-DRIVEN TEXTILES AS A CRYSTAL OF A NEW STREAM FOR STAKEHOLDER CAPITALI...
【AI論文解説】高速・高品質な生成を実現するFlow Map Models(Part 1~3)
Slides World Game (s) Great Redesign Eco Economic Epochs.pptx
Rise of the Digital Control Grid Zeee Media and Hope and Tivon FTWProject.com
Optimizing bioinformatics applications: a novel approach with human protein d...
Advancements in abstractive text summarization: a deep learning approach
Human Computer Interaction Miterm Lesson

One Time Pad Encryption Technique

  • 1. One Time Pad (Vernam Cipher) July 28, 2012 • Patrick CRYPTO • Rufus • Mark K. • Mark C. • Adams • Kelvin M. 1
  • 2. One Time Pad (Vernam Cipher) July 28, 2012 CRYPTO 2
  • 3. OTP History • First described by Frank Miller in 1882 the one-time pad was re-invented in 1917 and patented a couple of years later. It is July 28, 2012 derived from the Vernam cipher, named after Gilbert Vernam, one of its inventors. CRYPTO • Used by spies of the former USSR (Russia) during the 1960s • Used a stack of small very thin pages, each with a series of random numbers on them. After use, a page would be destroyed immediately 3
  • 4. OTP-Working Mechanism • The encryption-key has at least the same length as the plaintext and consists of truely random numbers July 28, 2012 • Each letter of the plaintext is 'mixed' with one element from the OTP • This results in a ciphertext that has no relation with the CRYPTO plaintext when the key is unknown. At the receiving end, the same OTP is used to retrieve the original plaintext 4
  • 5. OTP Rules • The OTP should consist of truely random numbers July 28, 2012 • Precisely two copies of the OTP should exist. CRYPTO • The OTP should only be used once. • Both copies of the OTP are destroyed immediately after use. 5
  • 6. Why OTP is Unbreakable • The key is atleast as long as the message • The key is truly random (not auto-generated) July 28, 2012 • Key and plain text calculated modulo 10/26/2 • Each key should only be used once & destroyed by CRYPTO sender and receiver • There should only be 2 copies of the key (1 for sender and 1 for receiver) 6
  • 7. OTP Criticism • Distribution of the key was a challenge • Adding numbers to the plaintext manually, is a time- July 28, 2012 consuming task. It is therefore sometimes thought that OTPs are no longer considered practical CRYPTO • Counter: Improved computing power now 7
  • 8. OTP Example • Problem: Alice wishes to send the message "HELLO" to Bob • ROE: Assume two pads of paper containing identical random July 28, 2012 sequences of letters were somehow previously produced and securely issued to both • Additional Info:Alice chooses the appropriate unused page CRYPTO from the pad. • How: The way to do this is normally arranged for in advance, as for instance 'use the 12th sheet on 1 May', or 'use the next available sheet for the next message'. The material on the selected sheet is the key for this message. Each letter from the pad will be combined in a predetermined way with one letter of the message. It is common, but not required, to assign each 8 letter a numerical value: e.g. "A" is 0, "B" is 1, and so on.
  • 9. OTP Example (Modulo26) • Here, we combine the key and the message using modular addition. July 28, 2012 • The numerical values of corresponding message and key CRYPTO letters are added together, modulo 26. • If key material begins with "XMCKL" and the message is "HELLO", then the coding would be…….. 9
  • 10. OTP Encryption CRYPTO July 28, 2012 10
  • 11. OTP Encryption [contd.] • If a number is larger than 25, then the remainder after subtraction of 26 is taken in modular arithmetic fashion. July 28, 2012 • This simply means that if your computations "go past" Z, CRYPTO you start again at A. • The ciphertext to be sent to Bob is thus "EQNVZ". Bob uses the matching key page and the same process, but in reverse, to obtain the plaintext. • Here the key is subtracted from the ciphertext, again using modular arithmetic…… 11
  • 12. OTP Decryption July 28, 2012 CRYPTO • NB: If a number is negative then 26 is added to make the number positive 12
  • 13. OTP Cryptanalysis • Suppose Eve intercepts Alice's ciphertext: "EQNVZ". July 28, 2012 • If Eve had infinite computing power, she would quickly find that the key "XMCKL" would produce the plaintext CRYPTO "HELLO", but she would also find that the key "TQURI" would produce the plaintext "LATER" 13
  • 14. OTP Cryptanalysis [contd] • It is possible to "decrypt" out of the ciphertext any message whatsoever with the same number of July 28, 2012 characters, simply by using a different key, and there is no information in the ciphertext which will allow Eve to choose among the various possible readings of the CRYPTO ciphertext • Thus, OTP coined, the “Perfect Cipher” 14
  • 15. Try This One: • Message: COME July 28, 2012 • Key: BABY • References: CRYPTO http://www.cs.miami.edu/~burt/learning/Csc609.051/notes/02.html http://www.cryptomuseum.com/crypto/otp.htm http://practicalcryptography.com/ciphers/ http://en.wikipedia.org/wiki/One-time_pad 15