One-Time Pad Encryption With No Pad? 415
thepooleboy writes: "The Globe and Mail has an article about a Toronto area company that has perfected 'Unbreakable Encryption' using the Vernam Cipher." The idea is to use as a one-time pad a large number generated by equations sent with an initial (proprietary) exchange which takes place when users connect to an equipped server. Since real one-time pads' numbers are by definition random and known in advance to both sender and receiver, though, the company seems to be playing fast-and-loose with their terms.
Pour me another cup of that snake oil! (Score:2, Informative)
And here I was just reminiscing fondly about ZeoSync the other day, when another scam pops up!
Not all ciphers... (Score:2)
Block ciphers are bijections between Z_2^p and Z_2^p, where p is the block size.
I doubt it (Score:4, Insightful)
Otherwise known as the encryption key? That's hardly a one-time-pad.
Re:I doubt it (Score:2, Insightful)
A one-type pad could be considered encryption key too though. The difference is that the theoretical kolmogorov complexity of a OTP is at least its own length.
If this nonsense can have it's 'pad generation algorithm' transmitted in b bits, then its kolmogorov complexity is at most b bits.
And if the algorithm is transmitted using a secure channel then the 'pad' is no more secure than that initial channel.
It's like the other old con - you can't use the tail end of a one-time pad to send the next whole one-time pad, no matter what they tell you.
So yes, you're right, the thing's just oozing bogons[*], and is fuxored from the start.
THL
[* The elementary particle of bogosity]
Sounds fishy to me (Score:2, Insightful)
Re:Sounds fishy to me (Score:2)
Big fscking deal. They generate a random number, use that as a seed, and store the seed in a database.
Whooptie-doo. I can write that in less than ten lines of Java code.
No offense, but this is old news (Score:3, Informative)
Thankfully, Google remembered exactly where the original article was at.
http://www.aspheute.com/english/20010924.asp [aspheute.com]
---
Partner Linux Site [monolinux.com]
I think we've been here (Score:5, Interesting)
Attempts to get around the fundamental limits of data encryption (and data compression, and a lot of other software fundamentals) remind me of all the pointless efforts to build a Perpetual Motion Machine. "Yeah, the smart guys say energy is "conserved", but anybody with any common sense can see if you just tweak this gearbox this way..."
Re:I think we've been here (Score:2, Funny)
All you need is a cold-fusion generator that works at absolute zero. Then you can generate enough energy to increment through all possible one-time-pad keys. Of course, you'd never be able to match the raw throughput of an infinite number of monkeys unless you sicced the Loch Ness monster on them. But watch out for Xenu while you're doing that!
Classic Snake Oil with = ~20-bit key (Score:5, Insightful)
Other classic sign I missed (Score:3, Insightful)
And I didn't bother pointing out that because these folks have no clue what a mathematical proof is, they didn't bother showing how their system preserves the properties of a OTP algorithm.
Re:I think we've been here (Score:2)
Now I can win $100,000! (Score:3, Funny)
I will use the secret powers of generating reproducable one-time pads to solve the equally overstated Bodacian challenge [virtual-media.com]!
The world will be all mine, Pinky!
nonsense (Score:5, Insightful)
Nonsense -- a one-time pad is only secure because there is provably no way to figure out the keys without a copy of the codebook (assuming they were generated through appropriate random means).
As long as a program is producing the keys, they will exist in a particular sequence. All you need to do is figure out at which point in the random sequence you are, and then you can generate the rest of the sequence easily, allowing you to eavedrop on the conversation.
Admittedly, the article was fluff, but key-hopping doesn't significantly increase the difficulty of breaking encryption. Unless there is something else behind this that I'm missing, this is another "Compress random data by 99%! For real this time!"
Re:nonsense (Score:2)
why?
Re:nonsense (Score:4, Insightful)
Re:nonsense (Score:4, Informative)
It could be that the "program" that is sent initially that generates the keys is different for each user. This would make it slightly more secure, but if that "program" were intercepted then every single key it generates would be compromised. It would also be vulerable if the program which generates the program which generates the keys was in any way predictable.
Re:nonsense (Score:2, Interesting)
-Dracken
nonsense ... MAYBE (Score:2)
And their paper on this has some merit:
http://www.prescient.net/pdf/e2Sec.pdf
But I am not qualified to debate its merits. I don't believe that a public newspaper will have the technological background to satisfy the slashdot folk who like that sort of thing.
Re:nonsense (Score:3, Informative)
I remember the session on cryptography blunders at LISA last year. Two of the major blunders they listed were calling something unbreakable, and using a one time pad more than once. In addition to the problem you point out, from the description it sounds like they are using the pad more than once. If they client generates a key, uses it to encrypt data, sends it to the server, then the server uses it to encrypt data and send it back, it's not a one time pad. It's being used at least twice to encrypt and send data, which makes this much less secure.
Plus the fact that they are claiming it is unbreakable immediately puts it off my list
Re:nonsense (Score:4, Informative)
-John Von Neumann
This latest 'unbreakable encryption' and 'generated one type pad' crap is the same as all the rest. Please don't try to defend it. I predict it will be featured in the 'Snake Oil' segment of Bruce Schniers (sic?) next monthly mailing.
Re:nonsense (Score:3, Insightful)
This is actually a lot better than it might sound, because you only have to worry about super-secure physical transit once, and then you get N opportunities to send completely unbreakable messages over whatever insecure channels you want. They could be announced on the nightly news if you wanted, and they would be completely and totally secure as long as nobody had your codebook.
(How can you prove they are "completely and totally" secure? Surely you can just brute-force a one-time pad?
There is no way to determine that "WE ATTACK AT DAWN" is the *true* plaintext, and not just some random coincidence that resulted from a certain choice of potential pad.)
Re:nonsense (Score:2)
I think this is what he's taking objection to... generating a sequence that is random enough to provide a secure one-time pad on a computer is not a non-trivial task in itself.
Re:nonsense (Score:2)
>>not a non-trivial task in itself.
If you've generated it on a computer using algorithmic means then BY DEFINITION it is not a one time pad.
But there are other choices (Score:2)
Mind you, this is not exactly algorithmic... this involves data sampling from the physical univers.
I'm still waiting until we discover that _everything_ has an underlying pattern... then who'll be laughing last? *heh*
Ask a certain pair of Nevada crooks (Score:3, Interesting)
Both went to prison, as I heard it.
Hrmm... (Score:3, Funny)
Not a One Time Pad.... (Score:2, Informative)
People do this with hash functions all fo the time (Score:3, Interesting)
Cryptographically secure hash functions like SHA or MD-5 are often used to convert shorter, shared numbers (the key) into a long bit stream that can be xor'ed with the file in much the same way as a one-time pad. This is done all of the time.
Let k be your key. Let b1, b2, b3 be blocks of bits. Take as many as you need to encrypt the file:
b1=SHA(key)
b2=SHA(snip(b1)+key)
b3=SHA(snip(
etc....
In fact, you can use any encryption function instead of SHA with a few tweaks.
Re:People do this with hash functions all fo the t (Score:2)
Let + stand for concatenation.
The weak point (Score:2)
Keyspace (Score:3, Interesting)
However, it isn't secure. If you know the algorithm, you only(!) have to search the keyspace of the initial seed.
Re:Keyspace (Score:2)
Big deal (Score:2)
Re:Big deal (Score:2)
But, you're absolutely right about the above method (and any other secure one) being impractical in the real world; its generally only used for the most secret of secrets...
WEBSITE LINK (Score:5, Informative)
finding their website was non trivial on google
its here
http://www.prescient.net/ [prescient.net]
Timothy: 1-1 (Score:2)
*scoffs* 'unbreakable' encryption (Score:4, Interesting)
Once the server is set up with E2Sec, anyone who logs on through a Web browser or Internet link will automatically be given an encrypted connection. A small 4- to 10-kilobit file, a bit like a Web cookie, is loaded into the client computer's memory. The file contains a program to generate random encryption keys, so that the keys themselves don't have to be sent over the network connection. The program is so tiny that even the low-powered processors in a cellphone can run it with ease, Mr. Kassam said.
This is really unbreakable. Unless you happen to intercept this program. Which wouldn't be that hard, and it may in fact be the same program for every client. And, they're touting this for wireless communications.
I found this next part interesting:
The client generates a series of random numbers to use as an encryption key. This is number is exchanged with the server through a secure process known only to Prescient, the server uses it to encrypt any information it sends back to the client, and then the key is destroyed and a new one is created. This process is repeated every time information is exchanged between the client and the server, making it virtually impossible for outsiders to decrypt the information.
It's a well established fact that non-open, secure processes are not secure. Cryptography is difficult, folks. The only way to even come close to proving that a particular process is secure is by exposing it to the scrutiny of the entire global community. Even then, its a case of proving that something is NOT true, which in this case involves incredibly complex mathematics that don't work for half of the proposed protocols out there; for instance, for a particular protocol to be 'provably' secure, it has to be time reversible (that is, if you apply any one step in reverse, the encryption key and cipher text each go back to their state before that step)
"We're 100-per-cent confident in our technology," Mr. Kassam said. "To give an idea of how difficult this is to crack, many organizations consider 128-bit encryption, which has a [cryptography level] of two to the power of 128, to be very secure. With e2Sec, we're talking about encryption in excess of 5,000 bits, and as much as two to the power of 10,000."
Ummmm... comparing asymmetric encryption to symmetric encryption (of which a one-time pad is a subset) with key-lengths is like comparing apples to oranges. In asymmetric encryption, your security is in your keyspace... every bit doubles the time to search the keyspace. In symmetric encryption, security is all about the keys; symmetric encryption is so easy to do that you can try millions of keys a second, as opposed to thousands or hundreds, so you HAVE to have a big keyspace. But, most symmetric encryption algorithms allow you to get it partly right; if the key is partly right, you get a partly decoded message, so the search algorithm is linear instead of exponential.
Re:*scoffs* 'unbreakable' encryption (Score:5, Insightful)
Ha! The fools! Just send your message through this secure process. No need for the one-time-pad nonsense! QED.
Re:*scoffs* 'unbreakable' encryption (Score:2)
If their e2Sec crypto is more difficult to crack than 128-bit encryption, why would their algorithm need a LARGER key?? That implies that it is weaker.
Of course, the quote is probably talking about some snake oil "128 bits of OUR crypto is equivalent to 5000 bits of THEIR crypto." yeah, right.
Re:*scoffs* 'unbreakable' encryption (Score:2)
But, most symmetric encryption algorithms allow you to get it partly right; if the key is partly right, you get a partly decoded message, so the search algorithm is linear instead of exponential.
Whaaa? Only if the symmetric algorithm *really* sucks. With a good symmetric cipher, toggling any bit of the key or any bit of the plaintext should result in a completely different ciphertext (meaning, on average, half of the ciphertext bits change).
What you say is completely untrue of any good cipher, symmetric or asymmetric. While I'm at it, you also said:
In asymmetric encryption, your security is in your keyspace... every bit doubles the time to search the keyspace.
This is generally true of symmetric ciphers, but is not true for most asymmetric ciphers. For example, since every 1024-bit RSA key is produced by multiplying two 512-bit primes and every 1025-bit RSA key is produced by multiplying a 512-bit prime and a 513-bit prime your statement would only be true if there were twice as many 513-bit primes as 512-bit primes, but that isn't true.
The rest of your post was quite good, but you kinda fell apart in the last paragraph.
Wrong. (Score:5, Informative)
This much is right.
In asymmetric encryption, your security is in your keyspace... every bit doubles the time to search the keyspace.
This much is nowhere near right. According to our best estimates at the present time, it'll take on the order of 2**80 operations to factor out RSA-1024. It'll take on the order of 2**128 operations to factor out RSA-3072.
Adding two thousand bits doesn't increase the difficulty by 2**2048... only 2**48. Asymmetric crypto does not double in difficulty with each added bit.
In symmetric encryption, security is all about the keys; symmetric encryption is so easy to do that you can try millions of keys a second, as opposed to thousands or hundreds, so you HAVE to have a big keyspace.
This is not correct. In fact, it's downright astonishingly wrong. The problem is you're assuming symmetric and conventional, non-ECC asymmetric keyspaces are both flat (they're not). But if they were flat, then asymmetric crypto would have a keyspace multiple orders of magnitude larger. Which is the opposite of what you're asserting here.
Conventional, non-ECC asymmetric keys are so huge because most of the keys are weak. Let's compare DES to RSA. Is 0xFA810DD0 a legitimate 64-bit DES key? Yes. (Note: DES only uses 56 of those bits for key material; the other 8 are used for parity.) Is 0xFA810DD0 a legitimate 64-bit RSA key? No. Why? Because 0xFA810DD0 is an even number, which makes it much, much easier to factor.
Conventional, non-ECC asymmetric keyspaces are so huge partially (not exclusively) because most of the keys in that keyspace are unusable. Symmetric keyspaces are so small partially (not exclusively) because most of the keys in that keyspace are usable.
A keyspace in which all (or the overwhelming majority of) keys possess equal strength is called a "flat" keyspace. A keyspace in which some keys are stronger or weaker is... well, non-flat.
But, most symmetric encryption algorithms allow you to get it partly right; if the key is partly right, you get a partly decoded message, so the search algorithm is linear instead of exponential.
This is so wrong that it staggers the imagination. Claude Shannon established some principles back in the 1940s which still guide cipher development today. One of these is called the avalanche effect. The idea behind the avalanche effect is that a single one-bit error, anywhere in the enciphering/deciphering process, will affect the output of half the bits in the entire e/d process.
Go ahead. Use Blowfish with a 40-bit key. (There are lots of Blowfish implementations out there; if you want one, email me and I'll send you one.) Encrypt it with one 40-bit key, and then decrypt it with a key that's only one bit different. You'll get absolute, total, gibberish. You'll get gibberish because Blowfish is a well-designed cipher and avalanches properly.
But wait--it gets even worse. Only a chump runs a cipher in electronic codebook mode. Usually, ciphers are run in a block-chaining mode, where every subsequent block gets XORed with the prior block. So if you have a one-bit error in your process, that will affect half the bits of the block... which then create errors in half the bits of the next block... which avalanche... which propagate their error forwards, on and on and on... etcetera.
You get the idea.
(All of the above information can be found in either Bruce Schneier's Applied Cryptography, 2nd Ed or Menezes, Oorschot and Vanstone's Handbook of Applied Cryptography.)
Author should be ashamed (Score:3, Insightful)
First off, the OTP is completely 100% unbreakable [in theory]. Even with infinite time an OTP is unbreakable.
No symmetric key system, even a really super-duper one can get that type of security. I mean sure, you could make it require 2^1000 time, but that isn't unbreakable. That is "not likely to be breakable", a strong difference.
Second, this is not the first company todo so. In fact the sci.crypt snake oil journal is full of similar companies. Any company that cites "unbreakable" and "OTP" when talking about their inhouse crypto is very suspect. Real credible companies don't play on such naive terms. RSA for example will play on the reliability of the code more than they will about the breakability of their ciphers they use [e.g. RC5/DES/AES]
Third, if it is not a OTP then its not a OTP. These "OTP-like" and "pseudo-OTP" phrases you read here and there are meaningless. Either its an OTP or it isn't. There is no half-way inbetween.
Fourth, as I read it you download a program that generates a stream? This is nothing new. What the heck do they think a stream cipher is [re: a block cipher in CTR mode is a good candidate]. What they don't say is if you make a 1000-bit pad with a stream cipher you're not supposed to think of that as a 1000-bit key for a message as in you have 1000 bits of entropy. If you use a 64-bit key to seed a cipher to make 1000-bits for a 1000-bit message than the key is still only 64-bits and you just stretched the entropy over 1000-bits.
e.g.
Entropy In >= Entropy Out
Fifth, everyone please laugh at the shameful cloakware people. Shameful! www.cloakware.com, they are an even bigger canadian joke.
Tom
Re:WRONG (Score:5, Informative)
Given infinite time, a monkey will eventually bang out the contents of the OTP.
Sure. The question is: How will you know it when you see it?
The monkey will bang out every possible n-bit sequence. Applying them all to the n-bit encrypted message will give you every possible n-bit message. So you'll get all of the following:
So, how, exactly, will you know when you've found *the* message?
That's why an OTP is provably unbreakable. Because every pad is equiprobable. And that's why no algorithmically-generated pseudo-random sequence can be used for a one-time pad.
Re:WRONG (Score:3, Insightful)
"I will meet you at the folowing location: XXX XX by XXX XX" where the Xs are the degrees and minutes of the two coridnates. Still buys you nothing, you can decode those into any combination of cordinates you want and yuo have no way of knowing which one is correct.
The problem is with a one time pad, like the orignal poster indicated, literally ANYTHING within that space is possable and since it is truly random (if done right) you just can't know when you have the right answer. You might decode something that you belive to be perfectly correct, it looks totally plausable, and still be dead wrong. You'd do just as well guessing at random with messages the same length as the encrypted document.
Further, you have no way of knowing or being able to tell if what I send was in the form you expected. Maybe it's all BinHExed, maybe it's gziped, maybe it's ROT-15'd. You just can't know.
If you want to try it I'd be happy to generate you a message encrypted with a one time pad and you can try to crack it. I'll even be generous and tell you the prices format it's in and tell you what the topic is. You'll still never crack it, and that's more information than you'd normally have when dealing with a message so encrypted.
Snake oil (Score:2)
This company is claiming unbreakable encryption because they have something like a OTP but have worked around the problem of having to transfer the pad itself. 'This is number is exchanged with the server through a secure process known only to Prescient'.
Okay, great. So now, instead of attacking the one-time-pad encryption, which we know is unbreakable if implemented correctly, hackers will now simply have to attack this 'secure process known only to Prescient'.
Snake oil. Their entire product really has NOTHING TO DO WITH ONE-TIME-PADS but instead, relies on a proprietary, secret algorithm that they won't tell you. At BEST, this is misleading. Their security is not unbreakable. It is far _less_ likely to be unbreakable than any other widely-known encryption algorithm. They are selling snake oil.
dubious (Score:2)
Certainly, a one time pad is only a one time pad if it is *truly* random. Unless the machine generating it has a true source of randomness---like a chunk-o'-radium or a pop-a-matic bubble---then they've just pushed the encryption somewhere else, and gained no security.
It still could be useful to generate such pads, since some devices (cell phones, etc.) don't have much processing power, and this is a way of offloading the encryption to a more powerful machine. Of course, you still need a secure method of transferring the pad.
But it doesn't sound like this is what they're doing, since they claim not to store the pad anywhere...
I'm dubious---encryption is only as good as the weakest link.
one time pads (Score:2)
Furthermore... (Score:2)
They improve the security even further, by using their patent-pending universal 16:1 compressor (in two passes, for 256:1 compression) on the plaintext before encrypting it.
"Unbreakable" is to "encryption", as... (Score:5, Funny)
Re:"Unbreakable" is to "encryption", as... (Score:3, Interesting)
That sinking feeling (Score:2)
That didn't work out, of course, and a lot of changes happened to make ocean travel safer. The "obvious" one -- more lifeboats -- is actually pretty unimportant. What is important? Safety training for ship's crew, disaster drills for passengers, the International Ice Patrol [uscg.mil], and the requirement that emergency radio frequecies be always monitored. Complicated, boring, you'll never see it in a movie -- but these measures have saved thousands of lives. I'm sceptical that "more lifeboats" or "oh gee, it was sinkable!" saved even one.
I see the same oversimplification in encryption. Mathematicians who claim their algorithms are "unbreakable" are not in denial. They're simply thinking too narrowly. There actually are encryption algorithms that can't be broken (at least by any known attack). But "unbreakable" is only true in a certain context. You have to assume that keys are generated in exactly the right manner. That brings you into the real world, away from the pristine certainties of mathematics.
So in an absolute sense, there's no Unsinkable and no Unbreakable. But dealing with these facts is more complicated than people like to bother with.
Re:"Unbreakable" is to "encryption", as... (Score:2)
Eh, except that some encryption is unbreakable.
Yes. A one-time pad is perfect cryptography. Shannon proved this long ago.
See HardEncrypt [sourceforge.net], for example.
Not really. HardEncrypt is a one-time pad implementation. The thing about OTPs is they're only as good as the key bits. HardEncrypt tells the user to record some sound with their sound card and use the resultant file as the key (after a mixing step). This would work fine if sufficient care were taken to extract maximum entropy from the sound input and if the key size were no larger than the extracted entropy. Its documentation goes on at some length about headers in the sound file and the non-randomness they provide, but that's far from the only source of non-randomness. I'm not saying that a message encrypted by a careful user of HardEncrypt would be feasible for anyone to break, but based on the desciption, it's not a good OTP and there may theoretically be enough redundancy in the keystream to allow information to be recovered.
Re:"Unbreakable" is to "encryption", as... (Score:2)
http://citeseer.nj.nec.com/cachin97unconditional.
Re:"Unbreakable" is to "encryption", as... (Score:2)
HardEncrypt is (let me say this again) unbreakable. Click the above link and read to find out why.
Re:"Unbreakable" is to "encryption", as... (Score:2)
You're right of course, but HardEncrypt is still useless, because one time pads are - for all practical applications - useless.
That's because, as soon as you publish the encrypted version of your file, your "one-time-pad" decryption key must be kept physically secure. And if you have to do that, you might as well have just kept the unencrypted version of your file physically secure in the first place.
This company is advertising a "have your cake and eat it too" approach, where an algorithm conveniently creates an "unbreakable" one time pad. It's nonsense. But so is the idea of using one-time-pads for security in any real sense.
Too brute to force (Score:2)
Unbreakable encryption (Score:2)
Unbreakable encryption is easy. I can write a program in under five minutes that will encrypt a file in such a way that I would be willing to guarantee, in cash, that it could never be broken. Simple algorithm, too:
Re:Unbreakable encryption (Score:2)
It is 100% reversible if you have the one-time-pad that caused the all-zero output to be generated. Assuming the method was XOR, the one-time-pad in this case would have coincidently been the exact inverse of the original message.
This is how one-time-pads work, and it's how they've been proven to be unbreakable if it's completely random and used in a flawless way that prevents outsiders from seeing the pad. (That's where the biggest problem is, and what makes them inconvenient.)
Having a one-time-pad that was generated by an algorithm is quite dodgy. Straight away it opens up the possibility of someone finding a way to figure out the algorithm and inputs that have been used to generate the pad.
Given enough example pads to work with, don't rule out someone spotting a pattern and figuring it out. Looking for recurring patterns that were generated by algorithms has been one of the most successful ways of breaking cryptography in the past.
Take a secure method and add multiple weaknesses.. (Score:3, Insightful)
So the program is transmitted through breakable encryption.
So the keys are generated using a pseudo-random number generator, which makes them quite guessable.
Then the key is transmitted over the network via breakable encryption, which they just said they wouldn't have to do.
Re:Take a secure method and add multiple weaknesse (Score:2)
Not necessarily. ANSI X9.17 is both a specification for a PRNG and a family of PRNGs. The ANSI X9.17 generators I've used (and coded) in the past have passed every test for statistical randomness I've thrown at them, for datasets ranging from 16 bytes to 16Mb.
We do have good PRNGs. The biggest problem is that people don't use them, instead trusting in their own "proprietary and special" PRNG.
Very likely just rubbish (Score:3, Insightful)
Working OTP encryption requires the random numbers to be truely random, a computer programm can't do that. You need a source of randomness in the computer like the user or a special hardware random generator. The user isn't a solution for random numbers for OTP because you need a lot of random numbers and the user will have to type or move his mouse for a very long time until he has produced enough random numbers for a OTP encryption of a short file.
Here the real problem of it. OTP encryption is only secure if no one can get his hand on the One Time Pad. If the OTP is transmitted over the internet, someone could easily get the OTP. If it is transmitted using a "secure process". The encryption is only as save as this "secure process". If this process is breakable, the whole encryption is breakable.
The "secure process" is also only known to Prescient. Everyone knows that "Security through Obscurity" doesn't work.
There's no such thing as Unbreakable (Score:2, Interesting)
The file contains a program to generate random encryption keys, so that the keys themselves don't have to be sent over the network connection.
The "book" method cannot be cracked by intercepting the message, true. How to solve this method? Steal the book. As has been pointed out in several previous stories of this genre, encoded data at some point has to be decoded and that makes it vulnerable.
The client generates a series of random numbers to use as an encryption key.
There's no such thing as a truely random number. There will be a way, no matter how difficult, to predict pseudorandom numbers. Especially if you've got a copy of the random number charts already. (Perhaps stolen the book?)
Exceptionally difficult to break, this encryption may be. But it is not unbreakable.
This is only "pseudo-random" (Score:2, Informative)
This system is using a pseudo-random number generation algorithm, albeit a changeable one, which means that with a very small amount of data it is possible to completely predict the entire key stream. That means that the "amount of information" really contained in that stream is very small, since a small algorithm completely defines it.
This is what one of the other posters was referring to as "key space". How much information must be guessed in order to decode the message?
For these snake-oil vendors, the amount of information that needs to be guessed to decode a message is only as big as the pseudo-random algorithm (or likely smaller, since these guys obviously don't know what they're doing). If you crack the beginning of a message, you've cracked the whole message no matter how large.
For a real one-time pad though, the amount of information which must be guessed is as big as the entire message. No matter how much of the message you "crack", you'll have no more advantage to cracking the rest than you did before. Each element is random. There is no "method" to predict random numbers and so there is no way to crack a true one-time pad.
just as unbreakable as... (Score:2, Funny)
honestly no matter how or what you use to encrypt things given a long enough time span someone WILL break it
much like on a long enough timeline the average survival rate WILL equal zero
"One time pad"+modifications ISN'T A ONE TIME PAD (Score:3, Insightful)
Dear Slashdot editors: A one-time pad is provably unbreakable provided you meet the very strict, precise definitions for what a one-time pad is.
Once you make the slightest change, it's no longer a "one-time pad", it's "a new unproven proprietary crypto system." There are NO exceptions to this rule. Any time you post a story that says, "Company X has a one-time pad system that is different than other one-time systems", they don't really have a one-time pad system, and you're just promoting their snake-oil for them. The OTP unbreakability is a mathematical proof, and you can't change the axioms and just claim the proof still holds!
Seriously, NO exceptions. Don't be tempted by their fancy footwork and wiley ways; they're trying to fool you
Can a company come up with a new cryptosystem that's cool? Yes, but they'll have to do a lot of hard work to prove it. This doesn't meet that standard.
When people first start to think about crypto... (Score:2)
Whatever the merits of this code - by definition it ain't a one time pad!
oh come on this isnt new (Score:2)
Flat out lies (Score:3, Insightful)
Either (A) they do not understand cryptography, or (B) they are intenionally lying about their cryptography. Either case is a good reason not to trust their cryptography.
-
By the way, how are One Time Pads created? (Score:2)
Re:'unbreakable' encryption (Score:5, Insightful)
However, this scheme isn't a one-time pad. It's a function, with parameters encrypted with a standard encryption algorithm. If you break the algorithm used to exchange the parameters, you've broken the whole code. It's certainly no better than anything else out there.
Re:'unbreakable' encryption (Score:2)
My understanding of one-way hash functions is they are usefull for comparing information like passwords or digital signatures, but not encryption. If you hash a message and send it to me, I can't un-hash it (because it's a one-way hash) I'd have to guess what the data was and then hash my guess to see if I was right.
Re:'unbreakable' encryption (Score:2, Interesting)
My 26,740 Turkish Lira,
~ravyn
Re:'unbreakable' encryption (Score:3, Informative)
The problems are the "random" bit and distributing the pad from the sender to the recipient.
These guys appear to have a pseudo-random key generation algorithm, which by defintion isn't random at all.
Re:'unbreakable' encryption (Score:2, Interesting)
Step 1: Generate a rather lengthy list of non repeating, as random as possible numbers.
Step 2: take the list and asign the letters of the alphabet in order along the list, (eg numbers in places 1 - 26 are assigned letters A - Z then 27 - 56 A - Z again.. and so on.)
Step 3: Make a duplicate of said list.
All communications are done with this code, using the numbers to represent letters, starting from the top, and use the number assigned to the fist instance of the letter, and proceed down the list for each use of the letter. (eg the first a would be the number in place 1, the second a would be the number in place 27)
As there's no pattren to it, it can't be broken. However, such a thing is so cumbersom to use, plus, there's the factor of how to get the list to the other party... Not a new idea, or even close to my own... read it in a book.
Re:'unbreakable' encryption (Score:2)
Re:'unbreakable' encryption (Score:2, Informative)
Actually, no. A one-time pad really is unbreakable if properly applied. One way of looking at it is that since the one-time pad is random and was not generated by algorithmic means, no algorithm can break it. Crypto folks use different terminology, but the result is the same: unless you compromise the pad itself, no decryption can do better than random chance.
These results are well established, and any decent text on information theory will fill in the details.
An interesting side-effect of this came up with some U.S. decrypts of Soviet espionage activity in the 1950s, which were decrypted when agents misused their one-time pads. The authorities didn't take any action, partly because they were concerned about proving in court that the decrypts were accurate...
...laura
A vernam cipher IS unbreakable (Score:5, Interesting)
Re:A vernam cipher IS unbreakable (Score:2)
You could use a large polynomial function; in that case, the amount of entropy in your encryption will be equal to the amount of entropy in your polynomials; if you can describe them in 128-bits, then that's the amount of entropy in your cipher.
Of course, all of this assumes that Eve intercepted the satelite signal at the same time.
Re:A vernam cipher IS unbreakable (Score:2)
Horse petunia (Score:2)
Re:A vernam cipher IS unbreakable (Score:2)
Where- if that's possible, then you must already have some secure means of communication and don't need to encrypt anything in the first place.
If I am a spy we can exchange the pad before I leave spy headquarters and then use it to transmit secret messages while I am in the field.
Re:'unbreakable' encryption (Score:3, Interesting)
A one time pad is completely random therefor you could take any message, "Bob had a car" and it could decrypt to ANY message of the same length, given the right pad. The biggest problem with a true one-time pad is that as the name implies it can only be used once, and needs to be the same size as the message its encrypting.
The best practical example of one-time pads is probably the hotline between washington and moscow. The crypto course I took explained that a very very large random one time pad was created to encode the message, and new pads are periodically created and taken by curier to each site. I believe a similar method is also used for transmitting launch codes to Nuke site.
Then again its been over a year, and my memory of the course is a little fuzzy.
Re:'unbreakable' encryption (Score:2, Informative)
That being said, the process they described in the article is not a Vernam cipher. It sounds like a variation on the Kerberos protocol, where the client and server machines exchange encrypted session keys.
There are also problems with the design, if you ask me. It looks like they are using the client computer to generate "random" numbers, which is a definite no-no. It also says that the keys are exchanged "through a secure process known only to Prescient". Sorry, but unless they have some sort of review by an independent party that proves it's
secure, it's an empty claim. Basically, this sounds like a lot of PR-hype that won't hold up to its promises.
cotodoso
Re:buzz .. wrong (Score:4, Funny)
kjashduyqwhasklasj
Underneeth each letter I put the row of the keyboard that the key belongs to.
kjashduyqwhasklasj
222222111122222222
Thus usuing me l33t 5kilz - I have determined that your keyboard is missing its entire thrid row of keys.
Re:The Past (Score:2)
Things ARE random. The noise made by compressed gas escaping from it's container is an example. So is stellar background radiation.
Re:The Past (Score:2, Informative)
One must assume that 'God' (Commonly defined as an all-knowing being) is capable of breaking one-time pad encryption systems.
I am not aware of any research into the creation of cryptosystems designed to resist compromise by supernatural forces, much less any system that can resist an attack by an omniscient, omnipresent, omnipowerful opponent.
Re:The Past (Score:2, Insightful)
In order to have a one time pad, and be perfectly, provably, secure, you must at some point earlier in time (maybe face to face in a secret bunker, where there are no bugs or cameras or tempest devices etc.) have had a secure channel over which to transmit and receive the pad.
The pad lets you transport that secrecy to another point in time. However, you must have had the secure channel in the first place. Are you sure that bunker is as secret as you think it is?
So yes, it's mathematically proven, but it's often very hard to set up in practice, because the preconditions are strict.
THL.
Re:The Past (Score:2)
Re:The Past (Score:3, Insightful)
1024 bit, while not unbreakable, is still unbreakable in the lifetime of the universe. I have no doubt methodologies and processes will be developped in the future that will change this, but as of right now, for all intents and purposes, it's unbreakable
Secondly, many parts of quantum mechanical behaviour *are* random, especially at macroscopic scales. For example, when a particular radioactive isotope chooses to decay is completely random; I've seen military random number generators that depend on this or similar effects to create truly random number.
But, no purely software random number generator will ever even come close to approaching randomness.
Re:If this works (Score:2, Interesting)
http://www.cryptonomicon.com IMNSHO the best funniest geekiest book ever written. Basically during the WW2 part of the book they are using one time pads and one of the ways they are producing the random numbers is by having a Vicar's wife pull balls out of a bingo machine. Well she starts to peek and then the numbers are not quite random and so a German is able to crack their one time pads.
Re:If this works (Score:3, Funny)
Re:Can't anyone use their heads at /. ???? (Score:2)
thanks, and have a good one.
Re:Can't anyone use their heads at /. ???? (Score:2)
I mean really, I doubt Timothy is trying to sell this to us. He's just preaching to the choir. And if Prescient was public he probably would of shorted a couple hundred shares before posting the story...
Re:Can't anyone use their heads at /. ???? (Score:2)
The atrocious content of your sig not-withstanding, I ask that you read the whole article before quoting part of it in a reply.
Your comments were echoed by said editorial staff in the article as it appears on the front page.
Meanwhile, could someone moderate this karma-bomb down? I'd like to think that swearing a lot and then repeating a standard slashot rant (right or wrong) is not woth a positive moderation.
Thanks.
Re:Can't anyone use their heads at /. ???? (Score:3, Insightful)
Re:Can't anyone use their heads at /. ???? (Score:2)
One step at a time, Cmdr!
How come editors post offtopic and get away with it? I've been rtlbed (or was it rtbled) for that.
Re:So what kind of Encryption protects the seed? (Score:2)
Re:Bad cryptography.... (Score:2)
Obscurity is one facet to security.
Obscurity on it's own is NOT security.
Given their method is proprietary and secret, you have no way of judging whether it is secure or not.
Re:OTP can be broken, given the right circumstance (Score:2, Insightful)
Consider aaaaa as an OTP encryption of something. Then, hello and quack are equally good decryptions, and there's nothing that tells you what the original message was.