[Cryptography] 1x pad: the elephant in the Apple/DOJ courtroom

Richard Outerbridge outer at interlog.com
Tue Feb 23 16:03:43 EST 2016


> On 2016-02-23 (54), at 13:49:34, Henry Baker <hbaker1 at pipeline.com> wrote:
> 
> Shannon publicly proved the 1x pad unbreakable in 1948.
> 
> The NSA Venona Project proved the 1x pad is *practically* unbreakable; the only successful Venona decrypts depended critically on the reuse of some key material.

[….]

> Anyone can use a 1x pad today to encrypt/decrypt *by hand* to send/receive SMS and/or email messages.  When the encryption/decryption is done by hand, the key material never need touch the cellphone and/or computer.

So how & where do the at least two copies of the manual one-time pad get securely generated & printed?

Or is that an exercise best left to the reader?
__outer



More information about the cryptography mailing list