One Time Pad Encryption The unbreakable
Transcription
One Time Pad Encryption The unbreakable
One Time Pad Encryption The unbreakable encryption method One Time Pad The unbreakable encryption method One Time Pad encryption is a very simple, yet completely unbreakable cipher method. It has been used for decades in mils electronic cipher systems for encrypting our customers’ sensitive data. Over the years, we have perfected the implementation of One Time Pad encryption into our products. Today, high levels of automation, high capacity storage media, continuous key protection, and huge One Time Pads provide our customers with outstanding communication security without sacrificing convenience. This document will help you understand how One Time Pad can ensure complete privacy for your sensitive information. Characteristics of the One Time Pad encryption method The One Time Pad encryption method is a binary additive stream cipher, where a stream of truly random keys is generated and then combined with the plain text for encryption or with the cipher text for decryption by an ‘exclusive OR’ (XOR) addition. It is possible to prove that a stream cipher encryption scheme is unbreakable if the following preconditions are met: A The key must be as long as the plain text. B The key must be truly random. C The key must only be used once. The One Time Pad implementation in mils electronic’s products fulfills all these requirements and therefore provides absolute protection for our customers’ sensitive information. Components of the OTP encryption Truly random key generation For One Time Pad encryption, a truly random key stream must be employed. The word ‘random’ is used in its most literal sense here. In mils electronic products, all keys are exclusively generated by a ‘True Random Noise Source’. This Noise Source is incorporated into the hardware security token of each mils electronic application. As it is part of the security token, it is protected against all manipulation and tampering attempts and provides a very high key generation speed. Oscillator ring 1 Combination stage Oscillator ring 2 1 001 0 Random bits Oscillator ring n The random noise source derives its randomness by sampling a set of parallel ring oscillators, a reliable technology for obtaining genuine randomness. This technique uses timing jitter and oscillator drift found in free-running CMOS ring oscillators as a source of randomness. Timing jitter is a random phenomenon caused by the thermal noise and local voltage variations present at each transistor of a ring oscillator. Local variations in voltage and temperature will cause each ring to oscillate faster (or slower) over time - resulting in a random drift relative to the other rings. As the frequency of each oscillator randomly drifts with each cycle, the output stream becomes random relative to the lower frequency sampling rate. The One Time Pad encryption process One Time Pad keys are used in pairs. The keys are distributed securely prior to encryption. One copy of the key is kept by the sender and one by the recipient. The confidentiality and authenticity of the One Time Pad keys can be guaranteed thanks to the continuous protection during their distribution and storage. Therefore, outsiders will not be able to misuse the key (e.g. by copying or altering the key during distribution). Plain text Cipher text One Time Pad 0 1 1 0 1 000 1 0 1 1 0 1 1 1 1 000 1 1 0 Exclusive OR function 1 0 1 0 1 1 1 0 1 0 1 00 1 1 Generated by the True Random Noise Source A To encrypt plain text data, the sender uses a key string equally long as the plain text. The key is used by mixing (XOR-ing) bit by bit, always adding one bit of the key with one bit of the plain text to create one bit of cipher text. B This cipher text is then sent to the recipient. C At the recipient’s end, the encoded message is mixed (XOR-ed) with the duplicate copy of the One Time Key and the plain text is restored. D Both sender’s and recipient’s keys are automatically destroyed after use, so that erroneous re-application of the same key is impossible. Why is One Time Pad encryption unbreakable? The popular scientific explanation Cipher text KNQX L Z RV Key 1 Z CVP Q I T A Y E S , C OM E Plain text 1 (meaningful) Key 2 HSUX Z R AV CPQX A T I F Plain text 2 (meaningless) Key 3 E T DYHCN X HZAUHP S E Plain text 3 (meaningless) Key 4 L F ZRX I B H S T AY O F F Plain text 4 (meaningful) Exclusive OR function The ‘brute force’ attack Attackers must try every possible key With One Time Pad encryption, the key used for encoding the message is completely random and is as long as the message itself. That is why the only possible attack to such a cipher is a brute force attack. Brute force attacks use exhaustive trial and error methods in order to find the key that has been used for encrypting the plain text. This means that every possible combination of key bits must be used to decrypt the cipher text. The correct key would be the one that produces a meaningful plain text. Since all One Time Keys are equally likely and come from a completely unpredictable noise source that is proven to be random, the attacker has to test all possible key strings. Unlimited computing power is useless Let’s assume an eavesdropper has intercepted a One Time Pad encrypted message and that he has unlimited computing power and time. For example, typical e-mail messages are at least 200 bytes long, requiring the testing of 1.600 bits. Even if the eavesdropper is both willing and able to do this, the following paragraph will describe why unlimited computational power will not compromise the system. Impossible to guess the right plain text If he used every possible key string to decrypt the cipher text, all potential plain text strings with the same length as the original plain text would appear. As illustrated above, most of these potential plain text strings would make no sense; however, every meaningful string the same length as the original plain text would also appear as a potential plain text string. Without knowing the applied OTP, the eavesdropper has no way of finding out which meaningful string is the original plain text. Thus, trying all possible keys doesn’t help the attacker at all, because all possible plain texts are equally likely decryptions of the cipher text. Why is One Time Pad encryption unbreakable? The mathematical proof DEFINITION A noise source is called a True Random Noise Source or fulfills the true random property if for all any generated key sequence for all satisfies (1) THEOREM: Unconditional security of One Time Pad For a cipher system with a true random noise source, the One Time Pad cipher is perfectly secret. PROOF First, we determine the length of the plain text by . Let denote the plain text and the One Time Pad generated by the true random noise source. The resulting cipher text is calculated by , i.e. for all . A system is called perfectly secret or unconditionally secure if for all (2) for all is satisfied. For we conclude from equation (2) and . (3) We get for all and true random property of the noise source by using the law of total probability and the (4) By again applying the true random property of the noise source and equation (2) for we obtain (5) and From the definition of conditional probability follows for all and all (6) and (7) and thus we get (8) From equation (5) and equation (4) we deduce equation (8) simplifies to and thus for all Hence, the mathematical proof is complete. . Further reading Schneier, Bruce: Applied Cryptography: Protocols, Algorithms, and Source Code in C. 1996, John Wiley and Sons, Inc. New York, Chichester, Brisbane, Toronto, Singapore Menezes, Alfred J., Paul C. van Oorschot, and Scott A. Vanstone: Handbook of Applied Cryptography 1997, CRC Press Boca Raton, New York, London, Tokyo The history of One Time Pad encryption The One Time Pad encryption method is nothing new. In 1882, Frank Miller was the first to describe the One Time Pad system for securing telegraphy. In 1917, Gilbert Vernam invented a cipher solution for a teletype machine. U.S. Army Captain Joseph Mauborgne realized that the character on the key tape could be completely random. Together, they introduced the first One Time Pad encryption system. Since then, One Time Pad systems have been widely used by governments around the world. Outstanding examples of a One Time Pad system include the ‘hot line’ between the White House and the Kremlin and the famous Sigsaly speech encryption system. Another development was the paper pad system. Diplomats had long used codes and ciphers for confidentiality. For encryption, words and phrases were converted to groups of numbers and then encrypted using a One Time Pad. The famous patent for the ‘Secret Signaling System’ from 1919. Each character of a message was combined with a character on a paper tape key. Frank Miller Gilbert Vernam Joseph Mauborgne mils electronic’s OTP history OTP encryption has always played an essential role in mils electronic’s product philosophy. When the company was founded in the late 1940s, OTP was the only applied encryption method. The TT-360 Tape Mixer was one of the first electro-mechanical cipher machines which the company developed and sold. TT-360 Tape Mixer M640 Tape Mixer M730 Cipher Machine with MilsCard OTP Cipher Disk M830 Cipher Machine MilsOne Client with OneQube Although unbreakable, OTP encryption is so simple that you can even employ it manually. We therefore often give a OTP Cipher Disk to our customers as a gift. When used correctly, it’s a powerful tool to create short unbreakable messages. With the invention of microprocessor technology, OTP encryption was complemented by algorithm based encryption in the M640 Tape Mixer or the M830 Cipher Machine. The usability of OTP was drastically increased by software based development. With the invention of the personal computer it was necessary to remove the sensitive parts of OTP encryption from the PC into dedicated security hardware, like the MilsCard of the M730 Cipher Machine. Today, the entire OTP storage and encryption process is handled by the OneQube, the hardware token of MilsOne. With its fully automated OTP usage and 29 GB of OTP storage it represents the state-of-the-art OTP implementation. mils electronic gesmbh & cokg · leopold-wedl-strasse 16 · 6068 mils · austria t +43 52 23 577 10-0 · f +43 52 23 577 10-110 · info@mils.com · www.mils.com TEC-OTP-04e
Similar documents
One Time Pad Encryption
Let’s assume an eavesdropper has intercepted a One Time Pad encrypted message and that he has unlimited computing power and time. A brute force attack would be very expensive for a plain text of re...
More informationOne Time Pad encryption
The MilsQube lies at the heart of the OTP implementation by mils. It safeguards the sensitive components of the One Time Pad system, provides True Random Number Generation (TRNG), and secure key st...
More information