Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Totally Random One Time Pads 265

liliafan writes "Scientists in Japan have come up with a way of harnessing a truly random datasource for generating one time encryption pads: Quasars. One time encryption pads are widely accepted as being the most secure form of encryption, but this new technology from the National Institute of Information and Communications Technology makes the pads even more secure."
This discussion has been archived. No new comments can be posted.

Totally Random One Time Pads

Comments Filter:
  • Dupe (Score:5, Informative)

    by TheComputerMutt.ca ( 907022 ) * <jeremybanks@jeremybanks.ca> on Thursday March 30, 2006 @07:40PM (#15030727) Homepage Journal
    This is a dupe of almost the same story from the same source [slashdot.org].
  • Re:almost there (Score:3, Informative)

    by PitaBred ( 632671 ) <slashdot&pitabred,dyndns,org> on Thursday March 30, 2006 @07:59PM (#15030861) Homepage
    Naah. Just prevent everyone except the intended recipient from knowing when you're recording it for the OTP. Much easier problem.
  • Re:So what? (Score:5, Informative)

    by homer_ca ( 144738 ) on Thursday March 30, 2006 @08:04PM (#15030883)
    Actually it's worse than that. From TFA:

    Each communicating party would only need to know which quasar to monitor and when to start in order to encrypt and decrypt a message.


    The name of the quasar and time to start monitoring are the cryptographic keys. That doesn't sound like a lot of bits in the keyspace.
  • by ChePibe ( 882378 ) on Thursday March 30, 2006 @08:16PM (#15030949)
    Some here may not be familiar with the uses of an OTP, so here's a common use:

    In order for an intelligence agency to communicate with an asset overseas, spy agencies must often use methods of communication that cannot be easily traced (duh). Passing a message along via e-mail, phone, or a one-to-one meeting can easily be tracked, creating lots of problems for everyone in the loop.

    Therefore, many intelligence agencies did (and still) use OTPs and "Numbers Stations" - shortwave radio stations that blast out a seemingly senseless series of numbers at regular intervals and frequencies. This method gets messages and instructions to your assets without betraying who the recipient of the message is.

    The beauty is that the asset only needs a cheap, readily available shortwave radio and a OTP, which can be concealed in virtually anything (some were created that could even be affixed to the back of stamps, others were hidden in toothpaste tubes, etc. The agent then responds with a seemingly inocuous method, a "wrong number code", a mark on a wall near where an intelligence officer drives, etc.

    The problem, of course, rests in getting OTPs to the asset and ensuring they aren't compromised. But, assuming they are passed and handled securely, there's no problem at all.

    More information on Wikipedia [wikipedia.org]

  • Re:So what? (Score:5, Informative)

    by interiot ( 50685 ) on Thursday March 30, 2006 @08:20PM (#15030975) Homepage
    The name of the quasar and time to start monitoring are the cryptographic keys. That doesn't sound like a lot of bits in the keyspace.
    Yes, but it's more secure than other keys, because the only way to attack it is to steal the keys before the time that the quasar is monitored. If an attacker discovers the keys afterwards, the key is useless.

    Also, the keyspace is larger than you think... the article mentions that quasars have a very broad frequency spectrum. So, #quasars (that are visible to both) X monitoring-time-choices X monitoring-frequency-choices may result in a large-ish keyspace (or, at the very least, means that it may be physically extremely expensive to try to decrypt a message against all possible keys).

  • Keyspace (Score:3, Informative)

    by Erich ( 151 ) on Thursday March 30, 2006 @08:20PM (#15030976) Homepage Journal
    There are relatively few quasars that are observable. Probably a lot fewer that are observable at the same time by two locations, if the two locations are geographically diverse. It is possible for a third party to monitor these discrete locations. Noise would be different to the two observation locations, which could be overcome using sufficient error coding in the plaintext at of course the loss of plaintext entropy, making it easier for a third party with perhaps a noisier signal (due to being slightly out-of-bound, etc) to obtain the plaintext.

    The fundimental problem is that the data is not fully random -- it is mostly deterministic based on the key of what quasar, what frequency and bandwidth, and what time. So an outside person could recover the plaintext by obtaining the observable behavior and trying all keys, or if the outside person could somehow obtain the key.

    This is a very similar situation to a "good" pseudorandom number generator. You can transmit the seed for the pseudorandom number generator and generate a one-time pad from the pseudorandom number generator. I guess the difference is that quasar behavior is not observable after the fact, but if it is feasable for the data to be logged then they reduce to similar solutions: find all the pads within the keyspace, xor with the cipher text, and watch for the entropy to drop or visibility of known plaintext.

  • Re:One Time Pads... (Score:1, Informative)

    by Anonymous Coward on Thursday March 30, 2006 @08:30PM (#15031031)
    No, only since the middle of the century or so.

    Before then, they used multiple-use rags. And smart women are starting to go [gladrags.com] back [lunapads.com] to them [bigstep.com].

  • Spiffy, but not news (Score:5, Informative)

    by Syberghost ( 10557 ) <syberghost@syber ... S.com minus poet> on Thursday March 30, 2006 @08:35PM (#15031058)
    This is a Vernam Cipher [wikipedia.org] with a novel but impractical noise source. It was news when Vernam invented it in 1917, and maybe again in 1919 when he patented it, but this version solves an already-solved problem in a manner that would sound really good if Lt. Colonel Carter suggested it on SG-1, but otherwise is inferior to existing solutions to the same problem.

    Nothing to see here, folks; move along.
  • most what? (Score:3, Informative)

    by eddeye ( 85134 ) on Thursday March 30, 2006 @08:41PM (#15031092)

    "One time encryption pads are widely accepted as being the most secure form of encryption..."

    Only for very limited definitions of secure. You have to produce the pads. You have to distribute the pads. You have to synchronize the pads. You have to dispose of the pads. All these steps are tedious and error-prone, and a chink in any of them destroys your supposed "perfect" security.

    Now if you said "OTP are the most algorithmically secure pads under ideal conditions", then I'd buy it. Otherwise, there's a reason only well-funded governments use these things. Ask the Soviets how well it worked for them.

  • Re:So what? (Score:2, Informative)

    by mal0rd ( 323126 ) on Thursday March 30, 2006 @08:49PM (#15031126)
    This is not like other forms of encyption where the attacker to brute force by going through all the possible keys after the fact. With all the telescopes and camera on earth, we can only monitor about 2% of the visible sky. So a single cracker can't possibly record the data from every quasar all the time, or even a small percentage of them. So even though the keyspace is small, the attacker only gets to make a few gueses.

    Let's say the communicators choose the least secure method and publish the exact time they will start recording the one time pad from the quasar. And assume the attacker can only monitor 1e-9 percent of the quasars at once. Then they have a fairly good chance of remaining undetected.

    Now if they just keep recording from that quasar for the entire session, the cracker could try lots of different stars over time and see which on matches. But enryption often uses cipher-block chaining, where the unecrypted data from earlier in the session is used to encrypt the next block in addition to the shared secret. If they did this the attacker would have no hope of breaking the encryption unless he gets lucky on the first transmission.
  • #6 ... (Score:3, Informative)

    by Schraegstrichpunkt ( 931443 ) on Thursday March 30, 2006 @10:55PM (#15031647) Homepage
    ... on the list of snake-oil warning signs [schneier.com].
  • by howlingfrog ( 211151 ) <ajmkenyon2002&yahoo,com> on Friday March 31, 2006 @03:09AM (#15032275) Homepage Journal

    There isn't any particularly better definition of randomness than "unpredicability".

    That's true not just as a rule of thumb, but in a more formal sense as well. The word "random" is pretty hard to come up with a mathematically formal definition for, and "pretty hard" may mean "impossible" depending on your definition of "definition" (more on that later). To make things simple, let's just talk about sequences of ones and zeros. Take for example the sequence 01101110010111011110001001101010111100110111101111 ... Definitions of randomness from statistics and probability just require a potentially random sequence to have all possible subsequences of a given length appear with the same frequency. That is, 0 appears exactly as often as 1; 00 appears exactly as often as 01, 10, and 11; 000 as often as 001, 010, 011, 100, 101, 110, and 111; and so on. The sequence I gave above passes those tests with flying colors. But it's not random at all. I'll put some spaces in it, and you'll see the pattern: 0 1 10 11 100 101 110 111 1000 1001 1010 1011 1100 1101 1110 1111... It's simply counting in binary. The longer you extend the sequence, the better it does in statistical randomness tests--the first few dozen bits have a pretty strong bias for 1 over 0, but that ends up as noise in the long run.

    The relatively young field of information theory introduces the concept of "algorithmic randomness." The randomness of a sequence of bits is defined to be the length of the shortest Universal Turing Machine program which ouputs that sequence. In pseudocode, our example sequence is output by the program:

    let i = 0
    while (true) do
    output i
    let i = i + 1
    end while

    That's a comically short program to generate an arbitrarily long sequence. So the example fails tests for algorithmic randomness miserably. The fun part is that the problem of finding the shortest UTM program to generate a given sequence is provably intractable. Thanks to the the Halting Problem [wolfram.com], you can't always tell if a given UTM program will halt or loop infinitely. All you could ever know is whether or not the program has output the desired sequence yet--if it's still running, it may do so eventually and then halt, it may output something else and then halt, or it may keep running forever. So algorithmic randomness plugs the holes in statistical randomness by trading an unreliably solvable problem for a reliably unsolvable one. You can't ever be sure a sequence is random, but you can sometimes be sure it isn't.

    I got off on a bit of a tangent there about information theory, but my point is that algorithmic randomness captures what we mean by "random" much better than statistical randomness. And algorithmic randomness is just a mathematically formal way of saying "unpredictable."

  • by Detritus ( 11846 ) on Friday March 31, 2006 @11:13AM (#15033929) Homepage
    There are established procedures for handling lost or garbled messages. One simple technique is to put a unique serial number on each page of the pad, include the serial number in the message header, and start all messages on a new page.

Intel CPUs are not defective, they just act that way. -- Henry Spencer

Working...