Perfect Security—One-time Pads
One-time padsIn past chapters we have looked at a series of encryption methods. Some ciphers, such as a simple shift cipher, are easy to break and so are not very secure. Other systems take more effort to break, but it is still reasonable to expect to be able to break them, although you may need lon...
        Saved in:
      
    
          | Published in | Elementary Cryptanalysis Vol. 22; pp. 179 - 184 | 
|---|---|
| Main Authors | , | 
| Format | Book Chapter | 
| Language | English | 
| Published | 
        Washington DC
          The Mathematical Association of America
    
        01.07.2009
     Mathematical Association of America American Mathematical Society  | 
| Edition | 2 | 
| Subjects | |
| Online Access | Get full text | 
| ISBN | 9780883856475 0883856476  | 
| DOI | 10.5948/UPO9780883859377.009 | 
Cover
| Abstract | One-time padsIn past chapters we have looked at a series of encryption methods. Some ciphers, such as a simple shift cipher, are easy to break and so are not very secure. Other systems take more effort to break, but it is still reasonable to expect to be able to break them, although you may need longer messages or an indication as to some portion of the message. Even in the case of RSA, there is a small chance that there will be a breakthrough in factoring or someone might be incredibly lucky and be able to factor n, so even a message encrypted using RSA is not 100% secure. In methods we have seen so far, the more secure systems require more effort on the part of the sender and receiver and this is what you'd expect. But the less secure methods have the advantage of being easy to implement and fast to use.Is perfect security possible? That is, when given a ciphertext is it impossible to find the plaintext, even if you are able to use an incredible amount of computing power and are incredibly lucky? Here, we want to be a little careful by what we mean by “finding the plaintext”. For instance, suppose we are using monoalphabetic substitution and our ciphertext is the message ABCD. | 
    
|---|---|
| AbstractList | One-time padsIn past chapters we have looked at a series of encryption methods. Some ciphers, such as a simple shift cipher, are easy to break and so are not very secure. Other systems take more effort to break, but it is still reasonable to expect to be able to break them, although you may need longer messages or an indication as to some portion of the message. Even in the case of RSA, there is a small chance that there will be a breakthrough in factoring or someone might be incredibly lucky and be able to factor n, so even a message encrypted using RSA is not 100% secure. In methods we have seen so far, the more secure systems require more effort on the part of the sender and receiver and this is what you'd expect. But the less secure methods have the advantage of being easy to implement and fast to use.Is perfect security possible? That is, when given a ciphertext is it impossible to find the plaintext, even if you are able to use an incredible amount of computing power and are incredibly lucky? Here, we want to be a little careful by what we mean by “finding the plaintext”. For instance, suppose we are using monoalphabetic substitution and our ciphertext is the message ABCD. One-time pads In past chapters we have looked at a series of encryption methods. Some ciphers, such as a simple shift cipher, are easy to break and so are not very secure. Other systems take more effort to break, but it is still reasonable to expect to be able to break them, although you may need longer messages or an indication as to some portion of the message. Even in the case of RSA, there is a small chance that there will be a breakthrough in factoring or someone might be incredibly lucky and be able to factor n, so even a message encrypted using RSA is not 100% secure. In methods we have seen so far, the more secure systems require more effort on the part of the sender and receiver and this is what you'd expect. But the less secure methods have the advantage of being easy to implement and fast to use. Is perfect security possible? That is, when given a ciphertext is it impossible to find the plaintext, even if you are able to use an incredible amount of computing power and are incredibly lucky? Here, we want to be a little careful by what we mean by "finding the plaintext". For instance, suppose we are using monoalphabetic substitution and our ciphertext is the message ABCD. In past chapters we have looked at a series of encryption methods. Some ciphers, such as a simple shift cipher, are easy to break and so are not very secure. Other systems take more effort to break, but it is still reasonable to expect to be able to break them, although you may need longer messages or an indication as to some portion of the message. Even in the case of RSA, there is a small chance that there will be a breakthrough in factoring or someone might be incredibly lucky and be able to factorn, so even a  | 
    
| Author | Feil, Todd Sinkov, Abraham  | 
    
| Author_xml | – sequence: 1 givenname: Abraham surname: Sinkov fullname: Sinkov, Abraham – sequence: 2 givenname: Todd surname: Feil fullname: Feil, Todd organization: Denison University  | 
    
| BookMark | eNptkLtOAzEQRY14iBDyBxQRHcWGsb1e26IKES8pUiJBasv2zkJeu2HtSNDxEXwhX8JGoSCIaUZzdc4t5oQclFWJhJxR6AmdqsvJeKSlAqW4EppL2QPQe6Szk-3_urNUiiPS0kxTBizNjkknhBk0I6TMAFqkO8a6QB-7j-jX9TS-f318jkpM4nSJ3bHNwyk5LOwiYOdnt8nk9uZpcJ8MR3cPg_4w8VTINEFVMAc5gpaMU1c4nmmrLOXOS2CQFygoE8prx71uSJaDQ2lVnjHpCi14m_Bt76quXtcYokFXVXOPZaztwr_YVcQ6GM45pMCMygzVaWOdb61ZiFVtNkYwM-NjpNrpeV0YShvoYgt5u3T1NH9Gs15VZnC9-8w-iE3h1V_Wu8rsgOZtufjf_gZ1RnZ_ | 
    
| ContentType | Book Chapter | 
    
| Copyright | The Mathematical Association of America (Incorporated) 2009 The Mathematical Association of America (Incorporated) 2009 2009 The Mathematical Association of America (Incorporated)  | 
    
| Copyright_xml | – notice: The Mathematical Association of America (Incorporated) 2009 – notice: The Mathematical Association of America (Incorporated) 2009 – notice: 2009 The Mathematical Association of America (Incorporated)  | 
    
| DBID | FFUUA | 
    
| DEWEY | 652.80151 | 
    
| DOI | 10.5948/UPO9780883859377.009 | 
    
| DatabaseName | ProQuest Ebook Central - Book Chapters - Demo use only | 
    
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc | 
    
| Discipline | Education Computer Science Mathematics Applied Sciences  | 
    
| EISBN | 9780883859377 0883859378  | 
    
| Edition | 2 | 
    
| EndPage | 184 | 
    
| ExternalDocumentID | EBC3330402_86_194 10.4169/j.ctt19b9krf.11 CBO9780883859377A054 9780883859377_xml_CBO9780883859377A054  | 
    
| GroupedDBID | -G2 089 A4J AABBV AAWPO ABARN ABIAV ABQPQ ACLGV ACNAM ADVEM AEKGI AERYV AFOJC AIXPE AJFER AKHYG ALMA_UNASSIGNED_HOLDINGS AMYDA AMYDF ANGWU AZZ BBABE BPBUR CDLIL CZZ FEAQG GDRSO GEOUK IWG JJU NK1 NK2 PQQKQ RW~ SN- 4U. ABCYY BOVJV C~9 DUGUG EBBCW FH2 G2 I6 IVK IWL NM7 PLCCB PQEST PQUKI RW VX XI1 AHWGJ FFUUA  | 
    
| ID | FETCH-LOGICAL-c1574-e8f2b0de097231bfb369a8a13bc7020dfe51258c9b3c92b02d0be7a8d627bf953 | 
    
| ISBN | 9780883856475 0883856476  | 
    
| IngestDate | Tue Oct 21 11:09:24 EDT 2025 Sun Jun 29 12:33:26 EDT 2025 Wed Sep 30 11:45:26 EDT 2020 Wed Mar 12 03:53:08 EDT 2025  | 
    
| IsPeerReviewed | false | 
    
| IsScholarly | false | 
    
| Keywords | exclusive-or BBS pseudo-random generator one-time pad perfect pseudo-random number generator Blum, Blum and Shub random number generator Vernam cipher linear congruence generator perfect security xor Vigenère square  | 
    
| LCCallNum | QA76.9.A25 S56 2009 | 
    
| Language | English | 
    
| LinkModel | OpenURL | 
    
| MergedId | FETCHMERGED-LOGICAL-c1574-e8f2b0de097231bfb369a8a13bc7020dfe51258c9b3c92b02d0be7a8d627bf953 | 
    
| OCLC | 929120246 | 
    
| PQID | EBC3330402_86_194 | 
    
| PageCount | 6 | 
    
| ParticipantIDs | proquest_ebookcentralchapters_3330402_86_194 jstor_books_j_ctt19b9krf_11 cambridge_upo_CBO9780883859377A054 cambridge_cbo_9780883859377_xml_CBO9780883859377A054  | 
    
| ProviderPackageCode | ANGWU -G2 RW~ FH2 SN-  | 
    
| PublicationCentury | 2000 | 
    
| PublicationDate | 20090701 2011 20090601 2009  | 
    
| PublicationDateYYYYMMDD | 2009-07-01 2011-01-01 2009-06-01 2009-01-01  | 
    
| PublicationDate_xml | – month: 07 year: 2009 text: 20090701 day: 01  | 
    
| PublicationDecade | 2000 2010  | 
    
| PublicationPlace | Washington DC | 
    
| PublicationPlace_xml | – name: Washington DC – name: United States  | 
    
| PublicationSubtitle | A Mathematical Approach | 
    
| PublicationTitle | Elementary Cryptanalysis | 
    
| PublicationYear | 2009 2011  | 
    
| Publisher | The Mathematical Association of America Mathematical Association of America American Mathematical Society  | 
    
| Publisher_xml | – name: The Mathematical Association of America – name: Mathematical Association of America – name: American Mathematical Society  | 
    
| SSID | ssj0000577600 | 
    
| Score | 1.3720622 | 
    
| Snippet | One-time padsIn past chapters we have looked at a series of encryption methods. Some ciphers, such as a simple shift cipher, are easy to break and so are not... One-time pads In past chapters we have looked at a series of encryption methods. Some ciphers, such as a simple shift cipher, are easy to break and so are not... In past chapters we have looked at a series of encryption methods. Some ciphers, such as a simple shift cipher, are easy to break and so are not very secure....  | 
    
| SourceID | proquest jstor cambridge  | 
    
| SourceType | Publisher | 
    
| StartPage | 179 | 
    
| SubjectTerms | Applied sciences ASCII Ciphers Ciphertexts Computer programming Computer science Controlled vocabularies Cryptography Discrete mathematics Integers Keywords Language Lexicology Linguistics Mathematics Number theory Numbers Orthographies Programming languages Pseudorandom numbers Pure mathematics Rational numbers Real numbers Subject terms Terminology  | 
    
| Title | Perfect Security—One-time Pads | 
    
| URI | http://dx.doi.org/10.5948/UPO9780883859377.009 http://universitypublishingonline.org/maa/chapter.jsf?bid=CBO9780883859377&cid=CBO9780883859377A054 https://www.jstor.org/stable/10.4169/j.ctt19b9krf.11 http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=3330402&ppg=194  | 
    
| Volume | 22 | 
    
| hasFullText | 1 | 
    
| inHoldings | 1 | 
    
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3LToQwFG10ZmNc-I7jK8S4FOXRAl2q0UxMdCZxJnHX0AcbdTCIRl35EX6hX-ItFBAfibohhBRozi3t6eXeexDagTVG4kByGLyU2Jh7rh0Ds7e1RpIABozDotjz2XnQH-PTS3LZaBQV2SU53xPP3-aV_MeqcA3sqrNk_2DZ-qFwAc7BvnAEC8PxE_ltu1lLP7oJ_M7go86eboHkleVFap8J7DLTh-Lb50U6dMP6Sr_vKJWtaPahyopKxhdG0q6Kg8CDibK1Bj3QTdl2E9A6pLTZLcKE4uvyZkY3pZyx3FLLxSx-bqnX9nle1TVdAIzxcNB6zJ7j0GYdqaP7Wm3Y4801Ozps33gARHEadT1MiNdBXViBj89qzxgwSP23sMxz1G_e_-69H2thVLGkX9bTgiSM5tGsThyxdEYH9HMBTanJIpqrZDMsM4suaqFsE1SzhCwDulWB_vbyWsFtabiX0fjkeHTUt41ohS1cEmJbRYnHHal0WSTf5Qn3AxpHsetzEQI1l4kCikUiQbkvKLT0pMNVGEcy8EKeUOKvoM4knahVZJEgoRIImCOjGCexLmPkYREp7gSK8Fj2EK4hYIKn7HfA99B2c9v9bfpDo_UCUqbH9x1sEUWeu5TTqyyBTWMP7VZAs-KnvokkFiXCd8zXbjLHY1HAXIrX_tfRdTTTjOQN1Mmze7UJFDDnW2bMvANehU6o | 
    
| linkProvider | ProQuest Ebooks | 
    
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Elementary+Cryptanalysis&rft.au=Sinkov%2C+Abraham&rft.au=Feil%2C+Todd&rft.atitle=Perfect+Security%E2%80%94One-time+Pads&rft.date=2009-07-01&rft.isbn=9780883859377&rft.spage=179&rft.epage=184&rft_id=info:doi/10.5948%2FUPO9780883859377.009&rft.externalDocID=9780883859377_xml_CBO9780883859377A054 | 
    
| thumbnail_m | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fassets.cambridge.org%2F97808838%2F59377%2Fcover%2F9780883859377.jpg | 
    
| thumbnail_s | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F3330402-l.jpg |