Perfect Security—One-time Pads

One-time padsIn past chapters we have looked at a series of encryption methods. Some ciphers, such as a simple shift cipher, are easy to break and so are not very secure. Other systems take more effort to break, but it is still reasonable to expect to be able to break them, although you may need lon...

Full description

Saved in:
Bibliographic Details
Published inElementary Cryptanalysis Vol. 22; pp. 179 - 184
Main Authors Sinkov, Abraham, Feil, Todd
Format Book Chapter
LanguageEnglish
Published Washington DC The Mathematical Association of America 01.07.2009
Mathematical Association of America
American Mathematical Society
Edition2
Subjects
Online AccessGet full text
ISBN9780883856475
0883856476
DOI10.5948/UPO9780883859377.009

Cover

Abstract One-time padsIn past chapters we have looked at a series of encryption methods. Some ciphers, such as a simple shift cipher, are easy to break and so are not very secure. Other systems take more effort to break, but it is still reasonable to expect to be able to break them, although you may need longer messages or an indication as to some portion of the message. Even in the case of RSA, there is a small chance that there will be a breakthrough in factoring or someone might be incredibly lucky and be able to factor n, so even a message encrypted using RSA is not 100% secure. In methods we have seen so far, the more secure systems require more effort on the part of the sender and receiver and this is what you'd expect. But the less secure methods have the advantage of being easy to implement and fast to use.Is perfect security possible? That is, when given a ciphertext is it impossible to find the plaintext, even if you are able to use an incredible amount of computing power and are incredibly lucky? Here, we want to be a little careful by what we mean by “finding the plaintext”. For instance, suppose we are using monoalphabetic substitution and our ciphertext is the message ABCD.
AbstractList One-time padsIn past chapters we have looked at a series of encryption methods. Some ciphers, such as a simple shift cipher, are easy to break and so are not very secure. Other systems take more effort to break, but it is still reasonable to expect to be able to break them, although you may need longer messages or an indication as to some portion of the message. Even in the case of RSA, there is a small chance that there will be a breakthrough in factoring or someone might be incredibly lucky and be able to factor n, so even a message encrypted using RSA is not 100% secure. In methods we have seen so far, the more secure systems require more effort on the part of the sender and receiver and this is what you'd expect. But the less secure methods have the advantage of being easy to implement and fast to use.Is perfect security possible? That is, when given a ciphertext is it impossible to find the plaintext, even if you are able to use an incredible amount of computing power and are incredibly lucky? Here, we want to be a little careful by what we mean by “finding the plaintext”. For instance, suppose we are using monoalphabetic substitution and our ciphertext is the message ABCD.
One-time pads In past chapters we have looked at a series of encryption methods. Some ciphers, such as a simple shift cipher, are easy to break and so are not very secure. Other systems take more effort to break, but it is still reasonable to expect to be able to break them, although you may need longer messages or an indication as to some portion of the message. Even in the case of RSA, there is a small chance that there will be a breakthrough in factoring or someone might be incredibly lucky and be able to factor n, so even a message encrypted using RSA is not 100% secure. In methods we have seen so far, the more secure systems require more effort on the part of the sender and receiver and this is what you'd expect. But the less secure methods have the advantage of being easy to implement and fast to use. Is perfect security possible? That is, when given a ciphertext is it impossible to find the plaintext, even if you are able to use an incredible amount of computing power and are incredibly lucky? Here, we want to be a little careful by what we mean by "finding the plaintext". For instance, suppose we are using monoalphabetic substitution and our ciphertext is the message ABCD.
In past chapters we have looked at a series of encryption methods. Some ciphers, such as a simple shift cipher, are easy to break and so are not very secure. Other systems take more effort to break, but it is still reasonable to expect to be able to break them, although you may need longer messages or an indication as to some portion of the message. Even in the case of RSA, there is a small chance that there will be a breakthrough in factoring or someone might be incredibly lucky and be able to factorn, so even a
Author Feil, Todd
Sinkov, Abraham
Author_xml – sequence: 1
  givenname: Abraham
  surname: Sinkov
  fullname: Sinkov, Abraham
– sequence: 2
  givenname: Todd
  surname: Feil
  fullname: Feil, Todd
  organization: Denison University
BookMark eNptkLtOAzEQRY14iBDyBxQRHcWGsb1e26IKES8pUiJBasv2zkJeu2HtSNDxEXwhX8JGoSCIaUZzdc4t5oQclFWJhJxR6AmdqsvJeKSlAqW4EppL2QPQe6Szk-3_urNUiiPS0kxTBizNjkknhBk0I6TMAFqkO8a6QB-7j-jX9TS-f318jkpM4nSJ3bHNwyk5LOwiYOdnt8nk9uZpcJ8MR3cPg_4w8VTINEFVMAc5gpaMU1c4nmmrLOXOS2CQFygoE8prx71uSJaDQ2lVnjHpCi14m_Bt76quXtcYokFXVXOPZaztwr_YVcQ6GM45pMCMygzVaWOdb61ZiFVtNkYwM-NjpNrpeV0YShvoYgt5u3T1NH9Gs15VZnC9-8w-iE3h1V_Wu8rsgOZtufjf_gZ1RnZ_
ContentType Book Chapter
Copyright The Mathematical Association of America (Incorporated) 2009
The Mathematical Association of America (Incorporated) 2009
2009 The Mathematical Association of America (Incorporated)
Copyright_xml – notice: The Mathematical Association of America (Incorporated) 2009
– notice: The Mathematical Association of America (Incorporated) 2009
– notice: 2009 The Mathematical Association of America (Incorporated)
DBID FFUUA
DEWEY 652.80151
DOI 10.5948/UPO9780883859377.009
DatabaseName ProQuest Ebook Central - Book Chapters - Demo use only
DatabaseTitleList


DeliveryMethod fulltext_linktorsrc
Discipline Education
Computer Science
Mathematics
Applied Sciences
EISBN 9780883859377
0883859378
Edition 2
EndPage 184
ExternalDocumentID EBC3330402_86_194
10.4169/j.ctt19b9krf.11
CBO9780883859377A054
9780883859377_xml_CBO9780883859377A054
GroupedDBID -G2
089
A4J
AABBV
AAWPO
ABARN
ABIAV
ABQPQ
ACLGV
ACNAM
ADVEM
AEKGI
AERYV
AFOJC
AIXPE
AJFER
AKHYG
ALMA_UNASSIGNED_HOLDINGS
AMYDA
AMYDF
ANGWU
AZZ
BBABE
BPBUR
CDLIL
CZZ
FEAQG
GDRSO
GEOUK
IWG
JJU
NK1
NK2
PQQKQ
RW~
SN-
4U.
ABCYY
BOVJV
C~9
DUGUG
EBBCW
FH2
G2
I6
IVK
IWL
NM7
PLCCB
PQEST
PQUKI
RW
VX
XI1
AHWGJ
FFUUA
ID FETCH-LOGICAL-c1574-e8f2b0de097231bfb369a8a13bc7020dfe51258c9b3c92b02d0be7a8d627bf953
ISBN 9780883856475
0883856476
IngestDate Tue Oct 21 11:09:24 EDT 2025
Sun Jun 29 12:33:26 EDT 2025
Wed Sep 30 11:45:26 EDT 2020
Wed Mar 12 03:53:08 EDT 2025
IsPeerReviewed false
IsScholarly false
Keywords exclusive-or
BBS pseudo-random generator
one-time pad
perfect
pseudo-random number generator
Blum, Blum and Shub
random number generator
Vernam cipher
linear congruence generator
perfect security
xor
Vigenère square
LCCallNum QA76.9.A25 S56 2009
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c1574-e8f2b0de097231bfb369a8a13bc7020dfe51258c9b3c92b02d0be7a8d627bf953
OCLC 929120246
PQID EBC3330402_86_194
PageCount 6
ParticipantIDs proquest_ebookcentralchapters_3330402_86_194
jstor_books_j_ctt19b9krf_11
cambridge_upo_CBO9780883859377A054
cambridge_cbo_9780883859377_xml_CBO9780883859377A054
ProviderPackageCode ANGWU
-G2
RW~
FH2
SN-
PublicationCentury 2000
PublicationDate 20090701
2011
20090601
2009
PublicationDateYYYYMMDD 2009-07-01
2011-01-01
2009-06-01
2009-01-01
PublicationDate_xml – month: 07
  year: 2009
  text: 20090701
  day: 01
PublicationDecade 2000
2010
PublicationPlace Washington DC
PublicationPlace_xml – name: Washington DC
– name: United States
PublicationSubtitle A Mathematical Approach
PublicationTitle Elementary Cryptanalysis
PublicationYear 2009
2011
Publisher The Mathematical Association of America
Mathematical Association of America
American Mathematical Society
Publisher_xml – name: The Mathematical Association of America
– name: Mathematical Association of America
– name: American Mathematical Society
SSID ssj0000577600
Score 1.3720622
Snippet One-time padsIn past chapters we have looked at a series of encryption methods. Some ciphers, such as a simple shift cipher, are easy to break and so are not...
One-time pads In past chapters we have looked at a series of encryption methods. Some ciphers, such as a simple shift cipher, are easy to break and so are not...
In past chapters we have looked at a series of encryption methods. Some ciphers, such as a simple shift cipher, are easy to break and so are not very secure....
SourceID proquest
jstor
cambridge
SourceType Publisher
StartPage 179
SubjectTerms Applied sciences
ASCII
Ciphers
Ciphertexts
Computer programming
Computer science
Controlled vocabularies
Cryptography
Discrete mathematics
Integers
Keywords
Language
Lexicology
Linguistics
Mathematics
Number theory
Numbers
Orthographies
Programming languages
Pseudorandom numbers
Pure mathematics
Rational numbers
Real numbers
Subject terms
Terminology
Title Perfect Security—One-time Pads
URI http://dx.doi.org/10.5948/UPO9780883859377.009
http://universitypublishingonline.org/maa/chapter.jsf?bid=CBO9780883859377&cid=CBO9780883859377A054
https://www.jstor.org/stable/10.4169/j.ctt19b9krf.11
http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=3330402&ppg=194
Volume 22
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3LToQwFG10ZmNc-I7jK8S4FOXRAl2q0UxMdCZxJnHX0AcbdTCIRl35EX6hX-ItFBAfibohhBRozi3t6eXeexDagTVG4kByGLyU2Jh7rh0Ds7e1RpIABozDotjz2XnQH-PTS3LZaBQV2SU53xPP3-aV_MeqcA3sqrNk_2DZ-qFwAc7BvnAEC8PxE_ltu1lLP7oJ_M7go86eboHkleVFap8J7DLTh-Lb50U6dMP6Sr_vKJWtaPahyopKxhdG0q6Kg8CDibK1Bj3QTdl2E9A6pLTZLcKE4uvyZkY3pZyx3FLLxSx-bqnX9nle1TVdAIzxcNB6zJ7j0GYdqaP7Wm3Y4801Ozps33gARHEadT1MiNdBXViBj89qzxgwSP23sMxz1G_e_-69H2thVLGkX9bTgiSM5tGsThyxdEYH9HMBTanJIpqrZDMsM4suaqFsE1SzhCwDulWB_vbyWsFtabiX0fjkeHTUt41ohS1cEmJbRYnHHal0WSTf5Qn3AxpHsetzEQI1l4kCikUiQbkvKLT0pMNVGEcy8EKeUOKvoM4knahVZJEgoRIImCOjGCexLmPkYREp7gSK8Fj2EK4hYIKn7HfA99B2c9v9bfpDo_UCUqbH9x1sEUWeu5TTqyyBTWMP7VZAs-KnvokkFiXCd8zXbjLHY1HAXIrX_tfRdTTTjOQN1Mmze7UJFDDnW2bMvANehU6o
linkProvider ProQuest Ebooks
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Elementary+Cryptanalysis&rft.au=Sinkov%2C+Abraham&rft.au=Feil%2C+Todd&rft.atitle=Perfect+Security%E2%80%94One-time+Pads&rft.date=2009-07-01&rft.isbn=9780883859377&rft.spage=179&rft.epage=184&rft_id=info:doi/10.5948%2FUPO9780883859377.009&rft.externalDocID=9780883859377_xml_CBO9780883859377A054
thumbnail_m http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fassets.cambridge.org%2F97808838%2F59377%2Fcover%2F9780883859377.jpg
thumbnail_s http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F3330402-l.jpg