Practical, scalable alternative session encryption using one-time pads

نویسنده

  • Marc W. Abel
چکیده

1) Summary When I was smaller, a five megabyte fixed disk cost $5,000, a 300 bps modem cost hundreds of dollars, and communication links were intercepted by attaching devices to the target subscriber's local loop. From then to now there have been three great implosions: the cost of storage, the cost of bandwidth, and the cost of surveillance. The wake of the first two implosions sheared away most obstacles to using one­time pads to encrypt data in flight, and the final imposition — I mean implosion — now makes consideration of one­time pads a practical necessity. So far as assurance of confidentiality is concerned, today's block ciphers and public key cryptosystems flunk the exam. I don't know how to recover an AES key or compute the discrete logarithm of an elliptic curve element, but there exists no proof that another cannot. Moreover, encrypted communications can be recorded and stored for later attack by algorithms and devices yet to be discovered. Equally concerning is that when a significant " break " is discovered for solving either puzzle, the safety of an entire planet's communication and data dissolves like instant pudding. The world is unready to ingest so much pudding. We need balance in our cryptographic diet, and we need that balance now. In this paper, I discredit many myths concerning one­ time pads, discuss practical steps to address perceived shortcomings, and shatter the notion that secure generation, distribution, and use of mammoth cryptographic keys cannot be practiced in every home, church, school, and business. I also discuss my own implementations, their capabilities and track record, and where they should lead. 2) Background Interest in one­time pads (OTPs) is not new, even for me. This research marks the third time in fifteen years that I have devoted 100% of my professional time for some weeks or months to advancing their practicality and adoption. Despite my best effort and good intentions, I have not done nearly enough, and my safety as well as the safety of our world both demand that I think on a larger scale than months and weeks. It turns out that one­time pads have a 130 year history that I can trace. American Civil War veteran Frank Miller invented one­time pads in 1882 for securing telegraphy. No pun intended, but frankly anyone who tells you that OTPs can't be distributed conveniently is a wuss. Miller would have told you …

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

1 DNA - Based Cryptography

Recent research has considered DNA as a medium for ultra-scale computation and for ultra-compact information storage. One potential key application is DNA-based, molecular cryptography systems. We present some procedures for DNA-based cryptography based on one-time-pads that are in principle unbreakable. Practical applications of cryptographic systems based on one-time-pads are limited in conve...

متن کامل

DNA-based cryptography

Recent research has considered DNA as a medium for ultra-scale computation and for ultracompact information storage. One potential key application is DNA-based, molecular cryptography systems. We present some procedures for DNA-based cryptography based on one-time-pads that are in principle unbreakable. Practical applications of cryptographic systems based on onetime-pads are limited in convent...

متن کامل

Formal Method of Encryption Using 9’S Complement

In this paper we show how implemented one time security encryption scheme is more lucid, effective. However it is more complex in nature of attacker view. The one-time pad encryption scheme itself is mathematically unbreakable. (See Claude Shannon's "Communication Theory of Secrecy Systems"). Therefore, the attacker will focus on breaking the key instead of the cipher text. Random key stream ca...

متن کامل

A Novel Smart Card Authentication Scheme using Image Encryption

From the user point of view, security and efficiency are the two main factors for any authentication scheme. However, most of the smart card authentication schemes are vulnerable to one or the other possible attack. In this paper, highly secured smart card authentication scheme is proposed using image encryption that resists all the possible attacks and satisfies the needs of a user. Its securi...

متن کامل

Secured Wireless Communication through Simulated Annealing Guided Traingularized Encryption by Multilayer Perceptron Generated Session Key (satmlp)

In this paper, simulated annealing guided traingularized encryption using multilayer perceptron generated session key (SATMLP) has been proposed for secured wireless communication. Both sender and receiver station uses identical multilayer perceptron and depending on the final output of the both side multilayer perceptron, weights vector of hidden layer get tuned in both ends. After this tunnin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1212.5086  شماره 

صفحات  -

تاریخ انتشار 2012