You are here

Ultra-Secure One-time Pad Encryption

Primary tabs

SizeSeedsPeersCompleted
5.18 MiB000
This torrent has no flags.


Ultra-Secure One-time Pad Encryption

PDF files and Software for Mac, Windows and Linux

The fundamental principle of any collective effort, whether at war or at peace consists of the creation of a collective entity, a group mind, a collective consciousness. This creation is based on interaction, based on exchange of information. This exchange of information is a weak spot in any form of group-consciousness. Information may be faked, it may be jammed by interfering transmitters or it may be eavesdropped and furthermore identities may be stolen or hijacked. Eavesdropping means the anticipation of strategic and tactic manoeuvres by an opponent and thus has to be avoided. Secure communication has to be both inexpensive, straightforward and easy to use. There are many forms of cryptography out there and most are flawed. Through propaganda the mainstream have been conditioned to trust certain forms of cryptography such as PGP or TrueCrypt. This conditioning has been performed by the very same suspects who want to prevent people from having more security and efficiency by truly secure forms of communication. Assuming that the NSA is probably fifty years ahead of public knowledge concerning cryptography, most software is merely a joke. If it was truly secure, it would have been removed from the market a long time ago. Secure encryption is a basic human right. It protects the American people's communication from those rulers who have no respect for the constitution, for freedom and any form of basic human rights.

Note: Any computer-program may contain a backdoor. Source-code can be trusted AFTER analysing it, not before. Computers connected to any network cannot be trusted - NEVER. Traffic-analysis may still be performed even on securely encrypted information.

TOR (http://www.torproject.org/) is quite useful, but it should be noted that many nodes are being operated by intelligence agencies. Secure encryption is required even when using TOR.

Definition of one-time pad

The one-time pad (OTP), also called Vernam-cipher or the perfect cipher, is a crypto algorithm where plaintext is combined with a random key. One-time pad was developed in 1917 by Gilbert Vernam for use on telex machines. Each transmitted 5-bit Baudot code was mixed with a random 5-bit code on a paper tape. Such tapes contained a large number of these random 5-bit codes and were called one-time-tape. The one-time-tape ran synchronously on both the sender's and the receiver's telex. Vernam's invention was the basis for several pencil-and-paper versions. The name one-time pad refers to the small notepads on which the keys are printed. These pads are small booklets or microfilms with groups of five numbers or letters. Today, digital one-time key versions enable the storage of much more random data and the encryption of large data files.
We can only talk about OTP if four important rules are followed. If these rules are applied correctly, the one-time pad can be proven to be unbreakable (see Claude Shannon's Communication Theory of Secrecy Systems). However, if only one of these rules is disregarded, the cipher is no longer unbreakable.

The key is as long as the plaintext.
The key is truly random (not generated by simple computer Rnd functions or such!)
There should only be two copies of the key: one for the sender and one for the receiver (some exeptions exist for multiple receivers)
The keys are used only once, and both sender and receiver must destroy their key after use.

Is One-time pad Unbreakable?

If all rules of one-time pad are followed? Yes! Since the key is truly random, one cannot determine wich key is used. If someone had infinite computational power he could go through all possible keys (a brute force attack). He would find out that applying the key XVHEU on ciphertext QJKES would produce the (correct) word TODAY. Unfortunately, he would also find out that the key FJRAB would produce the word LATER, and even worse, DFPAB would produce the word NEVER. He has no idea which key is the right one. In fact, you can produce any desired word or phrase from any OTP-encrypted message, as long as you use the 'right' wrong key. There is no way to verify if a solution is the right one. Therefore, the one-time pad system is proven completely secure.

The one-time pad encryption scheme itself is mathematically unbreakable. Therefore, the attacker will focus on breaking the key instead of the ciphertext. That's why a truly random key is essential. If the key is generated by a deterministic algorithm the attacker could find a method to predict the output of the key generator. If for instance a crypto algorithm is used to generate a random key, the security of the one-time pad is lowered to the security of the used algorithm and is no longer mathematically unbreakable. If a one-time pad key, even truly random, is used more than once, simple cryptanalysis can recover the key. Indeed, although the ciphertext result of a truly random key is a truly random ciphertext, using the same key twice will result in a relation between the two ciphertexts and consequently also between the two keys. The keys are no longer truly random and it's possible to recover both ciphertexts by heuristic analysis. Another unacceptable risk of using one-time pad keys more than once is the known-plaintext attack. If the plaintext version of a one-time pad encrypted version is known, it is of course no problem to calculate the key. This means that if the content of one message is known, all messages that are encrypted with the same key are also compromised.

Therefore, even the slightest mistakes in the implementation of one-time pad can lead to successful cryptanalysis. History has shown many examples of negligent use of one-time pad, the Venona project being the most notorious. Soviet Intelligence has historically always relied heavily on one-time pad encryption, with good reason and success. Soviet communications have always proved extremely secure. However, during the Second World War, the Soviets had to create and distribute enormous quantities of one-time pad keys. Time pressure and tactical circumstances lead in some cases to the distribution of more than two copies of certain keys. In the early 1940's, the United States and Great Britain analysed and stored enormous quantities of encrypted messages, intercepted during the war. Although it was searching for needles in a haystack, the top secret Venona project discovered the double use of some keys, enabling the decryption of many messages in the years after the war. Venona was crucial in solving spy cases such as the Rosenbergs or the Cambridge Five. Although Venona is often referred to as the project that broke Soviet one-time pads, they never actually broke one-time pad, but exploited implementation mistakes. This is a fine example of how important it is to follow the basic rules of one-time pad.

:wave: :D