[Cryptography] 1x pad: the elephant in the Apple/DOJ courtroom

Henry Baker hbaker1 at pipeline.com
Tue Feb 23 13:49:34 EST 2016


Shannon publicly proved the 1x pad unbreakable in 1948.

The NSA Venona Project proved the 1x pad is *practically* unbreakable; the only successful Venona decrypts depended critically on the reuse of some key material.

Soviet/Russian agents routinely used 1x pads -- including the hottie Anna Chapman picked up by the FBI in 2010 (best looking mug shot ever!).  These agents routinely get thrown out of the country, but rarely get compromised by their messages.

U.S. forces routinely used 1x pads in Vietnam; unfortunately, their condescension of their enemies led them to really bad OPSEC.

Anyone can use a 1x pad today to encrypt/decrypt *by hand* to send/receive SMS and/or email messages.  When the encryption/decryption is done by hand, the key material never need touch the cellphone and/or computer.

So, terrorists probably have used 1x pads in the past, and will continue to use 1x pads in the future, in the planning & execution of their plots.  Nothing in the law or technology will change this fact.

These end-to-end encrypted messages will continue to keep the FBI & NSA in the "dark".

So the only thing that DOJ/NSA wants to continue to do is *mass surveillance* on people too stupid or too lazy to use unbreakable encryption.

Although DOJ/FBI claims that this case is "targeted" at a single phone, we all know that this is a bald-faced lie; they are setting a precedent that will open up a billion+ cellphones around the world for routine mass surveillance.



More information about the cryptography mailing list