Book contents
- Frontmatter
- Contents
- Preface to the First Edition
- Preface to the Second Edition
- 1 Monoalphabetic Ciphers Using Additive Alphabets
- 2 General Monoalphabetic Substitution
- 3 Polyalphabetic Substitution
- 4 Polygraphic Systems
- 5 Transposition
- 6 RSA Encryption
- 7 Perfect Security—One-time Pads
- Appendix A Tables
- Appendix B ASCII Codes
- Appendix C Binary Numbers
- Solutions to Exercises
- Further Readings
- Index
- About the Authors
7 - Perfect Security—One-time Pads
- Frontmatter
- Contents
- Preface to the First Edition
- Preface to the Second Edition
- 1 Monoalphabetic Ciphers Using Additive Alphabets
- 2 General Monoalphabetic Substitution
- 3 Polyalphabetic Substitution
- 4 Polygraphic Systems
- 5 Transposition
- 6 RSA Encryption
- 7 Perfect Security—One-time Pads
- Appendix A Tables
- Appendix B ASCII Codes
- Appendix C Binary Numbers
- Solutions to Exercises
- Further Readings
- Index
- About the Authors
Summary
One-time pads
In past chapters we have looked at a series of encryption methods. Some ciphers, such as a simple shift cipher, are easy to break and so are not very secure. Other systems take more effort to break, but it is still reasonable to expect to be able to break them, although you may need longer messages or an indication as to some portion of the message. Even in the case of RSA, there is a small chance that there will be a breakthrough in factoring or someone might be incredibly lucky and be able to factor n, so even a message encrypted using RSA is not 100% secure. In methods we have seen so far, the more secure systems require more effort on the part of the sender and receiver and this is what you'd expect. But the less secure methods have the advantage of being easy to implement and fast to use.
Is perfect security possible? That is, when given a ciphertext is it impossible to find the plaintext, even if you are able to use an incredible amount of computing power and are incredibly lucky? Here, we want to be a little careful by what we mean by “finding the plaintext”. For instance, suppose we are using monoalphabetic substitution and our ciphertext is the message ABCD.
- Type
- Chapter
- Information
- Elementary CryptanalysisA Mathematical Approach, pp. 179 - 184Publisher: Mathematical Association of AmericaPrint publication year: 2009