One Time Pads (Real Ones!)

-----BEGIN PGP SIGNED MESSAGE----- One time pads are under rated, in my view. Not only are they secure forever, but the executive branch of the U.S. government says they are exportable. I've been thinking about how practical they are. One diskette holds about 150 messages. The people we trust tend to be people we communicate with a lot. An exchange of one box of diskettes should last a long time in most cases. The first 128 bits of the pad can be used as a key to identify it. This the recipient can figure out how to decode it by hunting through his or her key collection for the one that matches. When keys are exchanged, additional information can be exchanged and associated with each key. Length, for example. This means no length fields are needed because it can be recovered from the key itself. There are probably more examples. One time pads are self authenticating. For increased security, the use of a double one time pad is a good idea. Both correspondents generate key sets. The message is encrypted using one key from each key set. Again, no identifying information is needed, because the recipient can look for pairs of keys that work. If these key sets are exchanged through separate secure channels, they will be especially hard to compromise. Also, each user can be confident that the message is secure with regard to key material if they have generated the keys themselves. Keys should be destroyed immediately after use. This means that the only time the rubber hose attack is effective is during message transit. Key destruction is a hard problem, though, because it is difficult to be confident that the key has been completely erased from a disk. Use of diskettes improves the situation. Other media might be better, such as static memory. There is no good reason not to wrap one time pads in other encryption protocols. It is hard, maybe impossible for some algorithms, to crack a message when the contents have the appearance of noise. This means that it is hard to tell who is using one time pads and when they are doing it. Naturally, the user will send many messages which consist of noise, indistinguishable from a one time pad. This gives the user plausible deniability, especially if the practice is common. If the wrapper encryption protocol has not been compromised at the time of use, it has the pleasing result that it buys time. Should the message be recorded and filed on tape at Ft. Meade, and the encryption protocol broken ten years later, the user will have a very difficult time producing the key material. Key generation is an inadequately solved problem right now. There are chips which generate streams of random bits, but it is impossible to tell if they have been compromised. A home brew hardware based random number generator with a serial interface is probably the best way to go. The output of this device could be XORed with other source of randomness to increase confidence. One time pads seem practical to me. Comments? Monty Cantsin Editor in Chief Smile Magazine http://www.neoism.org/squares/smile_index.html http://www.neoism.org/squares/cantsin_10.htm -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQEVAwUBNF1/WZaWtjSmRH/5AQER3Af+M+T31s+VOdrCE61a0kbp0fe3Eyosoub2 YkAWZs48knTFgtAS0sv5IRrKparKaKdgAQISscBSuW5YXGi9WJCA2/3+2/+iwvrK 1tIoEDF+fYaq6/a2yiyI4PVZ8qPMpyLayZ3K89P8N8zzuQSMS6pB7yOf4waOufcF 6nAmcVG8/O4BddID15XiKbdc7QSpHKK2R3LlwrS4ZQBHyhYvC5Quo41SHNiWIGjO N6zMkBKuDXEpjmnX9O1LRelT7hEMX0ss6b4ZTmFw39NXwDwgFahP+C2/Zw+Kt0Je +/PNDJXWWQDWovVrCW2yKmpKeTPgxTJ1R4aEpt2CBwdQlMqVwpVrAg== =O5oZ -----END PGP SIGNATURE-----

Mix writes: : -----BEGIN PGP SIGNED MESSAGE----- : : One time pads are under rated, in my view. Not only are they secure : forever, but the executive branch of the U.S. government says they are : exportable. If your basis for saying that the U.S. government says that one time pads are exportable was the governments classification of a one time that I wrote in DOS assembly language using XOR to munge together the contents of two files, I don't think that you can rely on that authority since, at the same time, the government refused to rule that all one time pads using XOR are not subject to licensing under the EAR. -- Peter D. Junger--Case Western Reserve University Law School--Cleveland, OH EMAIL: junger@samsara.law.cwru.edu URL: http://samsara.law.cwru.edu NOTE: junger@pdj2-ra.f-remote.cwru.edu no longer exists

At 9:46 AM -0700 11/3/97, Peter D. Junger wrote:
: One time pads are under rated, in my view. Not only are they secure : forever, but the executive branch of the U.S. government says they are : exportable.
If your basis for saying that the U.S. government says that one time pads are exportable was the governments classification of a one time that I wrote in DOS assembly language using XOR to munge together the contents of two files, I don't think that you can rely on that authority since, at the same time, the government refused to rule that all one time pads using XOR are not subject to licensing under the EAR.
"Export a random number, go to jail." --Tim May The Feds have shown their hand: they want a ban on domestic cryptography ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^2,976,221 | black markets, collapse of governments. "National borders aren't even speed bumps on the information superhighway."
participants (3)
-
Mix
-
Peter D. Junger
-
Tim May