[Cryptography] 1x pad: the elephant in the Apple/DOJ courtroom

Henry Baker hbaker1 at pipeline.com
Tue Feb 23 17:25:06 EST 2016


At 01:03 PM 2/23/2016, Richard Outerbridge wrote:
>> On 2016-02-23 (54), at 13:49:34, Henry Baker <hbaker1 at pipeline.com> wrote:
>> 
>> Shannon publicly proved the 1x pad unbreakable in 1948.
>> 
>> The NSA Venona Project proved the 1x pad is *practically* unbreakable; the only successful Venona decrypts depended critically on the reuse of some key material.
>
>[
.]
>> Anyone can use a 1x pad today to encrypt/decrypt *by hand* to send/receive SMS and/or email messages.  When the encryption/decryption is done by hand, the key material never need touch the cellphone and/or computer.
>
>So how & where do the at least two copies of the manual one-time pad get securely generated & printed?
>
>Or is that an exercise best left to the reader?

Get your dice or spinners & write stuff down with pencil & paper.

Isn't that what crypto parties are for?  ;-)

Unless you're encrypting phone calls or movies, most messages are pretty short (< 140 bytes ?).

You might also consider using multiple sources of randomness & mixing, just in case the dice are loaded.



More information about the cryptography mailing list