[Cryptography] 1x pad: the elephant in the Apple/DOJ courtroom
Richard Outerbridge
outer at interlog.com
Tue Feb 23 16:03:43 EST 2016
> On 2016-02-23 (54), at 13:49:34, Henry Baker <hbaker1 at pipeline.com> wrote:
>
> Shannon publicly proved the 1x pad unbreakable in 1948.
>
> The NSA Venona Project proved the 1x pad is *practically* unbreakable; the only successful Venona decrypts depended critically on the reuse of some key material.
[….]
> Anyone can use a 1x pad today to encrypt/decrypt *by hand* to send/receive SMS and/or email messages. When the encryption/decryption is done by hand, the key material never need touch the cellphone and/or computer.
So how & where do the at least two copies of the manual one-time pad get securely generated & printed?
Or is that an exercise best left to the reader?
__outer
More information about the cryptography
mailing list