The one-time pad | Journey into cryptography | Computer Science | Khan Academy

  Рет қаралды 511,982

Khan Academy

Khan Academy

Күн бұрын

Пікірлер: 239
@sehnsucht333
@sehnsucht333 12 жыл бұрын
cryptologist bruce schneier on the OTP: "[it's] the only provably secure cryptosystem we know of. It's also pretty much useless. Because the key has to be as long as the message, it doesn't solve the security problem. One way to look at encryption is that it takes very long secrets -- the message -- and turns them into very short secrets: the key. With a one-time pad, you haven't shrunk the secret any. It's just as hard to courier the pad to the recipient as it is to courier the message itself."
@AdamPatrizio
@AdamPatrizio 4 ай бұрын
But it does allow you to pre-share a pad once and then have provably secure communication after that, even at great physical distances away. During the Cold War, security agencies used one-time pads in practice. So definitely not useless.
@ftj3kf3
@ftj3kf3 8 жыл бұрын
You are missing the most important part of the One-Time-Pad(OTP): If you encrypt ALICE using the OTP every possible word with 5 Letters is a possible outcome after the encryption. The "hacker" can not know which of these set of words is the initial encrypted one. Thats why the OTP is even unconditionally secure meaning that you cannot break it even if you have infinite computational resources.
@abdelrahmangamalmahdy
@abdelrahmangamalmahdy 6 жыл бұрын
No, if you have infinite computational resources and you sniffed a very long message, you can do pattern analysis to see which random combination of letters can result into english readable text. It's fairly complicated but doable if one has unlimited computational resources.
@creamy2895
@creamy2895 6 жыл бұрын
When you try out every combination of letters with the length of the message, you implicitly also try out every combination that makes the sentence a valid English sentence. So even if we assume that the message was (correct) English, Alice could've conveyed any semantic meaning that you possibly could using these 26 letters and correct English language. The only thing we know is the length of the message (though even that can be encrypted if you use appropriate methods). A pattern analysis won't help you if one possible encryption says "ATTACK ENEMY" and another "DO NOT SHOOT'. How're you gonna choose which one is right, especially if there's billions of other combinations, a lot of which directly contradict each other?
@abdelrahmangamalmahdy
@abdelrahmangamalmahdy 6 жыл бұрын
Yes, you are right.. I get it now
@sol3cito33
@sol3cito33 3 жыл бұрын
Exactly my thoughts.
@King_Cola
@King_Cola 2 жыл бұрын
What if the message has no meaning.. Except for the spy
@Wickedeh17GE
@Wickedeh17GE 8 жыл бұрын
The irony of stacking sheets of paper in a forest!
@sonnyhe2002
@sonnyhe2002 12 жыл бұрын
Simple, I'll give you an example to illustrate the how Eve can figure out the msg if the one time pad is used repeatedly. In the time of war, if Allies send a one time pad message to the troops in the front line to attack. If the Axis intercepts this encrypted text, they don't know what it means. But if the Allies reuse this one time pad and the Axis keep getting the same encrypted messages and the Allies keep attacking after each msg, then the Axis can figure out what that encoded msg means.
@PotadoTomado
@PotadoTomado 12 жыл бұрын
1. You can't share it multiple times because then you would give Eve multiple sources to work from, and he/she would be able to find patterns leading to the cypher. The one-time pad is elegant because the message is equally likely to be decoded into any sequence of letters the length of the original message. Once more messages are released, the number of possible cyphers is decreased significantly because they would have to fit with all of the messages 2. I think he'll cover that in the futur
@MrSilo86
@MrSilo86 11 жыл бұрын
I love this topic. I want more :D
@ThisTall
@ThisTall 3 жыл бұрын
When considering if these are usable on a device like a smart phone. It’s worth noting that password hacking had a 50-60% success rate 10 years ago, just by having the accelerometer read the tiny differences of your hands twitching when typing one letter versus the next. Just look at your keyboard and know that you can have a password long enough to take 37,000 years to brute force crack, but Apple has at least a 60% chance of cracking it in real time by being able to read the twitch difference between you hitting the G or the H.
@subvind
@subvind 2 жыл бұрын
and that is why playing the guitar is more secure than playing the piano
@13WhiteFang37
@13WhiteFang37 12 жыл бұрын
khanacademy never fails to amaze me.
@gedstrom
@gedstrom 5 жыл бұрын
The one-time-pad is the ONLY crypto scheme that can be proven immune to quantum computer cracking! Sure, it is inconvenient to have to exchange these secret keys ahead of time, but depending on the importance of what you are communicating, it might be worth it. Modern thumb drives can contain 256GB or more of random data that you can exchange with the other person, so there is little chance of running out of key material any time soon. Of course, you would need a scheme to insure that no key data is ever used more than once, and that the used key on your thumb drive is zeroed-out after it is used.
@blitzbladerr9035
@blitzbladerr9035 7 жыл бұрын
this is also assuming if the code breaker knows 2 26 sided dice was used
@htawrew13
@htawrew13 12 жыл бұрын
1) If both your messages are intercepted, it is possible to brute for the one-time pad. 2) With great difficulty- that's the problem with the one-time pad.
@KodakYarr
@KodakYarr 2 жыл бұрын
Yes, which is why it's called a "*one* time pad." You only ever encrypt one single message with it, after which it is discarded. If you reuse it you immediately open the door to pattern analysis.
@MasonC2K
@MasonC2K 10 жыл бұрын
I understand the idea here. But to me it seems impractical given the previously given scenario that Bob and Alice are separated. When Alice writes her message she is also creating the key using the one time pad. How would Bob be able to have the key that Alice created after they have already parted. She would have to send him the key as well which defeats the purpose. In order for encryption and decryption to work of distance both parties have to have the key beforehand.
@ethalum
@ethalum 10 жыл бұрын
True. Key exchange is now the big problem people want to solve. We now know that the one time pad is the best, but we don't know how to exchange keys over large distances. Google 'Key exchange' then there is loads more to learn!
@rlvsun
@rlvsun 10 жыл бұрын
During the ww2 and cold war this was the method of encryption used by the soviet spies. There is actual photos of the one time pad plus i understand that each spy agent has a boss who give them the one time pad, so both of them has the key to cypher and decipher the messages. They agree to use certain page in certain day.
@rohbinsonsamuel6755
@rohbinsonsamuel6755 10 жыл бұрын
ethalum once a very long pad has been securely sent it can be used for numerous future messages, until the sum of their sizes equals the size of the pad.... Exemple : use a book as the key u have just to give ur friend the name of that book.
@thelurkingpanda3605
@thelurkingpanda3605 10 жыл бұрын
send the next key in the message :)
@opmike343
@opmike343 10 жыл бұрын
Rohbinson Samuel Reusing one time pads SEVERELY cripples their security. Unless you're just transmitting gibberish, the occurrence of frequently used words like "and" and "the" can be used to compromise your code. Once has to assume that it won't just be some dude with a paper and a pencil trying to crack the code.
@moothemooer4322
@moothemooer4322 4 жыл бұрын
It is interesting that the time of the video is 2:56.
@78anurag
@78anurag 3 жыл бұрын
How
@Patman128
@Patman128 12 жыл бұрын
This is true, but only if they can figure out a likely string of text in the encrypted message and verify it by decrypting the same fragment in each message that uses the same key. Then, using the fragments in the other letters, guess more possible combinations for nearby letters and verify those. That's why it's the one-time pad; it's strength relies on it's ambiguity. With only 1 key and 1 encrypted message, it could be absolutely anything!
@ZTechSecurity
@ZTechSecurity 4 жыл бұрын
What is the function of that small dial thing?? @0:30
@sonnyhe2002
@sonnyhe2002 12 жыл бұрын
Well the one time pad is an arbitrary string or sequence of numbers(string can be converted to a list of numbers). You just shift the 1st letter in your msg with the 1st in the one time pad, then the 2nd letter with the 2nd number in the one time pad, and so on. Once all the letters in the original text is shifted, u'll get your cipher text. Bob decrypts the cipher text by unshifting it with the one time pad, which he should have.
@callmedragon5321
@callmedragon5321 8 ай бұрын
Unless you know the answer breaking it is always 1: in the total number of possibilities. Basically this video explains why you won't win the lottery
@dunx125
@dunx125 11 жыл бұрын
Please release more videos on this topic!
@IrregularPineapples
@IrregularPineapples 12 жыл бұрын
More of this! Please!
@computer_gai
@computer_gai 10 ай бұрын
greate work !
@ROMAQHICKS
@ROMAQHICKS 12 жыл бұрын
That is right. This encryption is usually broken as a result of an encoder using the same page more then once. @PhantomAct : You second questions answer is that the two cryptographer has to be together at some point in order to obtain a copy of the same pad. This is the reason why the Allies spent a decent amount of resources trying to obtain Axis OTP during the wars. But if you had the pad you had to keep it a secret from your enemy or they would just get a new OTP.
@rohbinsonsamuel6755
@rohbinsonsamuel6755 10 жыл бұрын
the best way to send keys is on the messages themselves i mean : you give the first key of the first (plantext)message to your friend physically, then when you send the message just add the key of the second message in this one , when you send the second message you add the key of 3th msg and so on... add the key in plantext not in ciphertext. example : plantext : yourmsg...nextkeyisjkjljkjlj that's it :)
@thelurkingpanda3605
@thelurkingpanda3605 10 жыл бұрын
yo
@ArkaidynSenpaii
@ArkaidynSenpaii 10 жыл бұрын
Well then all it would take is 1 message to be broken, then every message after that could be deciphered because you will have access to the source of encryption for the next message :P
@thelurkingpanda3605
@thelurkingpanda3605 10 жыл бұрын
But how would you break the previous ones? You don't have the key and its even harder because you can hide the cipher in the plaintext, further screwing them up. Even better, you can decide its like every 5th letter or something.
@rohbinsonsamuel6755
@rohbinsonsamuel6755 9 жыл бұрын
Arkaidyn impossible. because they don't have the key of the first message who were given to your friend physically....
@ArkaidynSenpaii
@ArkaidynSenpaii 9 жыл бұрын
Rohbinson Samuel The flaw is that all you need is to crack 1 code, and then you have access to read every message send after that since the code the new code is contained in the message, every previous message is safe just not the message that is cracked or any of the ones that follow.
@megaelliott
@megaelliott 12 жыл бұрын
Some random numbers could be used to swap letters around instead of shift them. So, for example, if the random numbers are 4,9,5,11,17, you would swap every 4th letter, then every 9th, 5th, 11th, 17th, etc.
@imfasa
@imfasa 12 жыл бұрын
the list has to be shared beforehand. Another requirement is, of course, that there should only be two copies of the list. if someone gets the key he will be able to decrypt the text. That a weakness in using this method, but if used correctly, it is the only unbreakable decryption method.
@Sarthex
@Sarthex 11 жыл бұрын
So, this is basically a vigenère cipher with a key that's the same length as the message?
@Lojikish
@Lojikish 12 жыл бұрын
(1) If you use it twice, then the encryption method simplifies to a Vigenere Cipher (like a fancy shift cipher) and is vulnerable to a frequency attack. (2) To share, use a courier?
@johnroyce8650
@johnroyce8650 3 жыл бұрын
To share the one-time pad key, **always** use a trusted courier for that matter.
@joeymatee
@joeymatee 12 жыл бұрын
these videos are amazing, is there any possibility of getting more?
@drkcaey
@drkcaey 12 жыл бұрын
I believe this is like PSK, Pre-Shared Key where you'll always have the other person, the receiver, to know the transition method to encryption.
@mrfrankincense
@mrfrankincense 12 жыл бұрын
It means you only use that specific sequence of random numbers once because two intercepted letters using the same set of random shifts could be broken.
@TheProjekton
@TheProjekton 9 жыл бұрын
There's only one problem with this type of cipher. If the key is random then the only way the receiver of the encrypted message would be able to view it, would be if you sent the key along with the message. Thus, making it readable to anyone who understands basic cryptography, which is something anyone can google now'a days. Now remember, it's called the *One-Time* Pad for a reason, meaning the key can only be used once. If the same key is used more than once then the cipher is no longer a One-Time Pad cipher, it's just a standard Vernam cipher. Which is more vulnerable to being broken. This type of cipher is more used to keep anyone from viewing something than it is to communicate between individuals. It's best to keep in mind that nothing you send with encryption is 100% secure. Not even a One-Time Pad cipher is 100% secure as it only appears to be impossible to break because of how long it would take, but it can be broken. Especially with the power of molecular and even quantum computers which are being tested and even used to some degree now.
@Henry-fv3bc
@Henry-fv3bc 8 жыл бұрын
It is totally impossible to break a one time pad encryption - even with infinite computational resources, quantum or not. This is because, mathematically, there is no information stored in the encrypted message. Every possible decryption is equally likely. Using the example of a five-letter word, every possible five letter word is equally likely to be the decryption. The downside to OTP is that the key must be secure and it can only be used once.
@ineednochannelyoutube5384
@ineednochannelyoutube5384 6 жыл бұрын
The key is sent before the message. Probably before the reciever even departed. This makes the use nieche, yes, but it is still the most secure system that exists.
@Entity314
@Entity314 12 жыл бұрын
How do they share the key?
@ProsyMe
@ProsyMe Жыл бұрын
keep khan academy free by paying for it, let's go!
@KulasangarGowrisangar
@KulasangarGowrisangar 6 жыл бұрын
Plus the key can't have repetitions is it? If so in the 0:37, there's N written twice! Or is it for a single word?
@ineednochannelyoutube5384
@ineednochannelyoutube5384 6 жыл бұрын
It can have repetitions, as true randomness will in fact produce long strings of repetitions.
@PostFormitable
@PostFormitable 12 жыл бұрын
No Cause in this method you can use the same spacing but in randomness it is VERY unlikely that it'll happen. For instance if I am protecting this message Hello Then a random number generated is 2 2 2 2 2 (WHICH IS VERYYY UNLIKELY) I would get the message as J G N N Q. But obviously getting 2 2 2 2 2 in random is like saying 1/26 * 1/26 * 1/26 * 1/26 * 1/26. Remember were not taking out a gap after we use it. Otherwise this method would only be useful for messages less then 26.
@sonnyhe2002
@sonnyhe2002 12 жыл бұрын
What do u mean 'chaotic algorithm'? If you are saying to encrypt with randomness, then you'll have to think about how Bob is going to decrypt the message. Or are you talking about salting random chars in the message? Then a longer one time pad will have the same effect.
@PostFormitable
@PostFormitable 12 жыл бұрын
Cause he gets all pieces of the information to solve it e.g. the shift numbers, which direction it shifts, and the encrypted message.
@piggy6394
@piggy6394 3 жыл бұрын
Thank you very much. Very easy to understand. I got so curious that I did the math in Excel. You notice that the OTP has 21 21 19 for E L E, this should have been Z G X, not Z G N heheh, not that it matters so much
@abetlen
@abetlen 12 жыл бұрын
As for the second part of your question the OTP is used by several governments including the United States of America and the British government, as I understand it the keys are typically transported to the recipients location ahead of time and under HEAVY security.
@bautrey
@bautrey 12 жыл бұрын
More of this series!!
@PostFormitable
@PostFormitable 12 жыл бұрын
So bob gets the random numbers ? or the crypt message ? And if bob gets both, then couldn't eve figure it out, considering the random numbers are the instructions to decrypt it ?
@sonnyhe2002
@sonnyhe2002 12 жыл бұрын
Well all encryption have to share the keys before hand, so i don't think this is a weakness of the one time pad. The only weakness is you can only use it once.
@frilansspion
@frilansspion 12 жыл бұрын
they have the key from the beginning. an agent would have a bunch of keys to use (dont know if they had an id nr or something to tell which). if used twice you can work out some letters by just trying shifts and comparing what makes words. a fair bit of work but can potentially be done, as opposed to with just the one sheet. I think. :)
@throwawayaccount3707
@throwawayaccount3707 3 жыл бұрын
The point of OTP is that the key should only be used once, hence the name. Reusing the key would obviously compromise it.
@pieinghigh
@pieinghigh 11 жыл бұрын
I recommend to anyone interested in the topic to check out Numberphile's two videos on the Enigma machine from WWII; very good stuff.
@megaelliott
@megaelliott 12 жыл бұрын
You could have a secret chaotic algorithm that generates random numbers. That way Alice could attach the input for the alorithm to the message, and it could be different each time a message is sent, and Eve wouldn't be able to work out the shift.
@fruitygranulizer540
@fruitygranulizer540 Жыл бұрын
creating an algorithm that generates truly random numbers is, with our current knowledge, impossible
@bautrey
@bautrey 12 жыл бұрын
Do more videos in this series!!
@dreinertson
@dreinertson 12 жыл бұрын
To get your OTP through Customs, you might try swallowing some microfilm. You need to make absolutely sure the OTP isn't read surreptitiously in transit. If your job is to defeat someone else's OTP system, you can either search Bob's room, hack his computer, or ask him to show you the OTP. Of course, this is exactly the problem. If you had a perfectly secure and convenient way of distributing OTPs, you'd have a secure way of sending messages.
@fashizzle
@fashizzle Жыл бұрын
Let's say Alice and Bob put together 1,000 one-time pads in advance, during a time where the threat of interception was much lower. Later on if they needed to communicate securely in a time when interception was much higher, they can now use the one-time pads they already created and shared with each other earlier. This is why they can still be more useful. You can limit your vulnerable period to one secure exchange and then have numerous less secure exchanges afterwards
@jlmknight
@jlmknight 12 жыл бұрын
but would it not be 26*25*24*23*22 because you wouldn't want to have one letter representing more that one letter, ie one to one mapping?
@00chips
@00chips 12 жыл бұрын
1) Because then you have a repeating pattern (Occurs twice).
@pradeepvenkatesan5806
@pradeepvenkatesan5806 11 жыл бұрын
best way to explain !!! keep it up !!! (y)
@michaellentz2887
@michaellentz2887 6 жыл бұрын
How and when, is the list of random offsets shared ?
@SlickBlackCadillac
@SlickBlackCadillac 3 жыл бұрын
It would have to be shared in person. And then you could never use the same one time pad again. If you didn't want to share it in person, you would need to use a different encryption method to transmit the pad. Well, now the pad would only be as strong as the form of encryption you used to transmit it. So it is by far the least convenient as it requires a great deal of anticipation and energy to protecting the secrecy of the one time pad by both parties. Hardly useful in MOST applications.
@johnroyce8650
@johnroyce8650 3 жыл бұрын
@@SlickBlackCadillac Except military and diplomatic communication, and espionage
@SlickBlackCadillac
@SlickBlackCadillac 3 жыл бұрын
@@johnroyce8650 what is the definition of "most"?
@bautrey
@bautrey 12 жыл бұрын
I want more of this!!
@mica122213
@mica122213 4 жыл бұрын
more of this 8=====D?
@XenoContact
@XenoContact 8 жыл бұрын
Assume quantum technology well mastered. Would a well developed quantum processor still struggle to crack it in a reasonable amount of time?
@quietcivic
@quietcivic 8 жыл бұрын
It would fail to crack it for a very simple reason. Because of the equal frequency distribution, it is as likely that the answer is 'Alice' as the answer be 'Julie', 'Woods', or any other five-letter word (assuming it even is a word in the English language). The sheer number of possibilities coupled with the countless 'false' positives makes quantum computing no help in cracking this.
@Walshy2000
@Walshy2000 6 жыл бұрын
What conditions need to be met to ensure perfect security?
@KodakYarr
@KodakYarr 2 жыл бұрын
1. Never reuse an OTP to encrypt more than one message under any circumstances. 2. Make absolutely sure that the distribution of the OTP's is not at any point compromised. 3. Agents must keep their OTP's secure at all times making absolutely sure the OTP's are never copied or otherwise revealed. 4. Implement a method allowing an agent to identify or find out which OTP's have been used but which message they have missed allowing them to cull and annihilate those OTP's. 5. After an OTP has been used to unencrypt a message the OTP must immediately be annihilated.
@teenfoe
@teenfoe 10 жыл бұрын
ham radio? you listen to the numbers stations?
@25karensarmiento
@25karensarmiento 8 жыл бұрын
Then how is the recipient able to read the message? Does Alice need to send the key as well? Then Eve can break it too? So is she the only one with the key and the only one able to read it???
@rz5505
@rz5505 8 жыл бұрын
The key is communicated before the message transmission through a secure channel. For example, this one-time pad is used in Washington-Moscow hotline where the key is communicated through a secure telephone before the real message is exchanged.
@imfasa
@imfasa 12 жыл бұрын
yeah sort of... but what i mean is that only getting the key to the other person might be considered as dangerous (you take the risk of the key being intercepted) anyway, have a nice day :)
@masterofktulu
@masterofktulu 12 жыл бұрын
Again... wow..
@KhanAcademyLabs
@KhanAcademyLabs 12 жыл бұрын
Yes, we are still in the world of "Private Key" cryptography which requires A and B to meet first. Public Key cryptography deals with the case when they cannot meet first. Coming soon!
@andreaspanagi3149
@andreaspanagi3149 6 жыл бұрын
Does anyone know what is that metal thing between the numbers and the encrypted message she uses to encrypt the message in the beginning?
@16D
@16D 12 жыл бұрын
if i were to capture a bunch of these cipher text, can i eventually break the encryption?
@ineednochannelyoutube5384
@ineednochannelyoutube5384 6 жыл бұрын
no as long as the key is changed literally every bit.
@samuelfeder9764
@samuelfeder9764 11 жыл бұрын
I think unfortunately the method is slightly missrepresented here because the spaces where kept (because it makes it easier to follow visually I suppose). The spaces should however be treated as characters as well making it a 27 letter alphabet (all letters plus space).
@samuelfeder9764
@samuelfeder9764 11 жыл бұрын
If this is done the only thing that EVE might still get out of the message is length of the total message, and if we would add some random letters at the end EVE would only get an upper bound on the lenght of the message.
@LionKimbro
@LionKimbro 3 жыл бұрын
OTP is great! But it's not bulletproof, for all cryptographic purposes. If someone can anticipate what the encrypted message might be, (like for example, perhaps it could be something crazy and unusual like, "GET / HTTP/1.1", but if that could be guessed --) then the attacker can modify the message in place. There are ways to protect an OTP against this kind of an attack, but it's an additional step.
@Lawh
@Lawh 10 жыл бұрын
What if you'd have multiple messages with this same key. Could you then start to decipher the messages in the same fashion as with the more simple example? You would stack them all up and see which letters are repeated. I'm not smart enough to see if that would work or not.
@opmike343
@opmike343 10 жыл бұрын
If you're using the "pad" more than once, than it is no longer a "one time pad."
@noxure
@noxure 12 жыл бұрын
You're not far off, but algorithms can not behave chaotically; the idea itself is a paradox. Algorithms can only generate pseudo-random numbers which where we have to hide it source, but in theory it can always be reverse engineered by a competent hacker. To solve this problem we use specialized hardware that is actually chaotic in nature. It's basically a box containing a small quantity of radioactive material that measures it's decay and convert that to numbers.
@mandingaification
@mandingaification 12 жыл бұрын
It wouldn't be 1 kilometer tall because it would fall over. :)
@zcnaipowered7407
@zcnaipowered7407 4 ай бұрын
Imagine it falling on the message recipient
@Lojikish
@Lojikish 12 жыл бұрын
Nothing is foolproof, even the one time pad.
@ineednochannelyoutube5384
@ineednochannelyoutube5384 6 жыл бұрын
Fools can indeed ruin everything.
@davidemodi7617
@davidemodi7617 8 жыл бұрын
perfect
@jlmknight
@jlmknight 12 жыл бұрын
I do agree getting 5 in a row is very unlikely, but getting say 2 in a row is not so much, say your same message HELLO became JGNNQ but what if H=N , E=G, L=N, O= Q, so now when decrypting N's how do you know whether it is an H or an L?
@hassannazar4178
@hassannazar4178 9 жыл бұрын
That is all good.. But for the one-time pad cryptosystem to work, We have to somehow be able to share the One-time pad with the recipient without EVE finding out. Because if Eve gets ahold of the one time pad, then she can just as easy as the recipient decrypt the text. RSA is by far the best solution to this.
@csiszar311
@csiszar311 9 жыл бұрын
***** That's the biggest flaw with this system. The best way to encrypt imo is to develop a personal language with the recipient verbally, then when both understand it, wirte it down. It'll have the same effect as the use of the Navajo language by the U.S. in WWII.
@hassannazar4178
@hassannazar4178 9 жыл бұрын
Ανδρέας Ανάγνος There is an encryption standard called RSA which is used all over the world today. You do not need to share the decryption key with the recipient thus this becomes full proof. Look at the RSA encryption video by khanacademy. It is also used in modern technologies such as your credit card chip etc.
@anonymousmystery82
@anonymousmystery82 9 жыл бұрын
***** you can also use SHA or MD5 for hash encryption..
@lilbahr
@lilbahr 9 жыл бұрын
+Hassan Nazar Well, basically you only need to meet once. Absolutely, if there is no way to meet, ever, then obviously OTP is not going to work. But if it is possible to meet at least once, then there is no reason to use anything else except OTP, for _strategic_ messaging. 1 TB disk of key and the two parties can talk for the rest of their lives, in ABSOLUTE secrecy. RSA or other means can not provide this.
@hassannazar4178
@hassannazar4178 9 жыл бұрын
+lilbahr CORRECTION: They CAN indeed provide the same level of secrecy, also... without the need to ever meet up. Thus it is by far superior. Secondly, we are talking about a scenario which is applicable in our modern era with internet and technology! A place where one guy from Europe wants to confidentially converse with a business guy from Asia. Is it possible for them to physically meet up, maybe, but why? When you have RSA..
@StanleyZheng
@StanleyZheng 9 жыл бұрын
Is there any way to effectively crack this code?
@ArtOfTheProblem
@ArtOfTheProblem 9 жыл бұрын
+Stan the MAN nope...
@StanleyZheng
@StanleyZheng 9 жыл бұрын
wow the perfect cipher! Took long enough...
@Andrewsafb71
@Andrewsafb71 9 жыл бұрын
+Stan the MAN It's existed for at least a century
@StanleyZheng
@StanleyZheng 9 жыл бұрын
I know, but it's still quite modern
@msss126
@msss126 8 жыл бұрын
+Stan the MAN Well, it is about 100 years old. The reason it isn't more popular is because of practical concerns. It is hard to generate genuinely random keys. Then the other problem is distributing these keys.
@ThamizhanDaa1
@ThamizhanDaa1 8 жыл бұрын
Isn't this the same thing as using Vigenere Cipher with the length as the same length as the message?
@baklava423
@baklava423 8 жыл бұрын
better late than never: nope, the vigenere cipher makes use of a keyword, e.g. LIGHT, which then is repeated to match the length of the plaintext (e.g. LIGHTLIGHTLI). in addition the OTP can never be broken, because it relies on (true) randomness, whereas the vigenere cipher relies on the keyword mentioned above.
@ThamizhanDaa1
@ThamizhanDaa1 8 жыл бұрын
+Steakkini okay so what I meant is that the word that is repeated is just as long as the message , then it would be the same idea, right? so, the if the message is LIGHT, then using the word FISHY as the key would be the same thing as what the video is explaining, right?
@ThamizhanDaa1
@ThamizhanDaa1 8 жыл бұрын
+Steakkini okay so what I meant is that the word that is repeated is just as long as the message , then it would be the same idea, right? so, the if the message is LIGHT, then using the word FISHY as the key would be the same thing as what the video is explaining, right?
@baklava423
@baklava423 8 жыл бұрын
that is true, i suppose. but isn't this (from an abstract point of view) true for any other crypto system? as far as i understand, keys (e.g. in AES) are applied over and over again, but with some additional stuff going on (like substitution, permutation etc. for confusion).
@baklava423
@baklava423 8 жыл бұрын
whoops didnt see your full comment, sry. for the scenario of LIGHT and FISHY it is probably the same, but i actually dont know how problematic using a real word as keyword in this case is.
@frilansspion
@frilansspion 12 жыл бұрын
launch codes are a kind of a password isnt it, not a cipher. what has that to do with OTPs? "need to know the length of the code"? to decrypt something youd obviously need the encrypted message. the "length" is the same as that.
@jlmknight
@jlmknight 12 жыл бұрын
but my argument is that what if all the letters a,l,i,c,e all get mapped to the same letter, say T, then it would be encrypted as TTTTT...but then it is useless because the word is no longer recoverable, there for your options for the first letter is 26, then for the second 25 because you cant use the one you chose the letter A, and soo one till you get 22 for the last letter
@rohbinsonsamuel6755
@rohbinsonsamuel6755 10 жыл бұрын
if u wanna send a clear message... then use the key as a message and a ciphertext as a key, Example : (HELLO) is the real message (WATER) is the message u send (DEEPF) is the key.... so here (HELLO) is the Plaintext (WATER) is the Onetimepad (DEEPF) is the ciphertext ... you can send an ordinary letter hidden a message.
@Jedidiah13
@Jedidiah13 10 жыл бұрын
what is the device that she is turning in the video??? can anyone tell me?
@warped_rider
@warped_rider 10 жыл бұрын
Cipher wheel.
@KhanAcademyLabs
@KhanAcademyLabs 12 жыл бұрын
No it must be 26*26*26...otherwise you'd be eliminating possibilities. There is a 1/26^5 chance that ALICE would be encrypted as ALICE - and this is okay. I will go into more detail soon!
@markgriz
@markgriz 12 жыл бұрын
Bob has the same one time pad key. It's the secure sharing of the key which is the greatest weakness of the one time pad.
@BrentDeJong
@BrentDeJong 11 жыл бұрын
You don't choose that letter, you shift by that letter.
@MrBumbo90
@MrBumbo90 12 жыл бұрын
We need moreeee
@vaibhavpatil2611
@vaibhavpatil2611 10 жыл бұрын
how do we always get a uniform frequency distribution in one time pad?
@opmike343
@opmike343 10 жыл бұрын
Make sure your random number generation is TRULY random. If you're asking why true randomness leads to uniform frequency distribution, this is covered in the video at around 2:00.
@ArkaidynSenpaii
@ArkaidynSenpaii 10 жыл бұрын
Because the number of the shift is found through rolling a dice, the source of the shift is always random, the number selected always has 1/26 probability, therefore you get the even distribution.
@lucaswilson898
@lucaswilson898 9 жыл бұрын
vaibhav patil It's basically a different ceasar cipher for each letter in the message. That means that every letter turns into a random letter (each having a 1/26 chance). This substitution favors no letters causing it to be uniform.
@ineednochannelyoutube5384
@ineednochannelyoutube5384 6 жыл бұрын
+Arkaidyn Except dice are not truely random. Use isotope decay instead.
@KulasangarGowrisangar
@KulasangarGowrisangar 6 жыл бұрын
I don't get it, how bob would decrypt it back to plain text by using the same key (I mean the random number shifts shown in the vid)?
@Caleb-qr6lo
@Caleb-qr6lo 6 жыл бұрын
to encrypt you add the specified shifts ... to decrypt you subtract the shifts. simple. Bob has to know the key of course.
@hfulhorst
@hfulhorst 4 жыл бұрын
*QUANTUM COMPUTING*
@TimWarner
@TimWarner 12 жыл бұрын
@megaelliott Isn't using an algorithm potentially a source of leak? My understanding is that many cypher algorithms are well known, so statistical analysis might reveal the algorithm and put the code breaker closer to knowing the secret input. BTW, I read an article some time back about NSA using mathematical analysis to find suspicious encoded messages within the flow of internet traffic; this is way over my head, but it does make me question the assertion that OTP is unbreakable.
@SPastaL
@SPastaL 9 жыл бұрын
the stack of outcomes would be too Damn high!
@FluorescentGreen5
@FluorescentGreen5 7 жыл бұрын
otp is only uncrackable because of it's lack of a message authentication code. no MAC means it's vulnerable to being corrupted. as far as im concerned, OTP is just a basic XOR cipher with large single use keys and no MAC
@ineednochannelyoutube5384
@ineednochannelyoutube5384 6 жыл бұрын
What makes it special is that the key is single use.
@rachelz1041
@rachelz1041 8 жыл бұрын
hello!! could someone please do me a really big favor and tell me what kind of dice I can use to generate the random shifts I would need in order to create my own encrypted text? I'm trying to make my own for a paper that I have to write for school but I'm struggling to find a 26 sided dice like they use in the video. Any advice would be helpful :)
@rachelz1041
@rachelz1041 8 жыл бұрын
+Khan Academy please help if you could
@XenoContact
@XenoContact 8 жыл бұрын
I can help you out with that. If you want I could write you a piece of software that handles that for you.
@throwawayaccount3707
@throwawayaccount3707 3 жыл бұрын
@@rachelz1041 It doesn't have to be specifically 26-sided dice (I don't think that kind of dice exists anyway; the ones used in the video are certainly not 26-sided). It could be anything as long as it's truly random (so no using algorithm like the person above me probably wanted to do, because that would be pseudorandom).
@andrizeemynizee8623
@andrizeemynizee8623 12 жыл бұрын
yjod od dp serdp,r@ (this is so awesome!) I did this by shifting my hands over one place to the right on my keyboard.
@spacecat3198
@spacecat3198 4 жыл бұрын
Hmm yeah, but then it could be a little more complex by using a different keyboard layout (eg DVORAK).
@xandersotheraccount2356
@xandersotheraccount2356 4 жыл бұрын
@@spacecat3198 lol wanker
@spacecat3198
@spacecat3198 4 жыл бұрын
Handon McKak Any reason why you’re so rude?
@xandersotheraccount2356
@xandersotheraccount2356 4 жыл бұрын
@@spacecat3198 You sound like you want to be smart. Idk
@spacecat3198
@spacecat3198 4 жыл бұрын
Handon McKak Not really no.
@TraceguyRune
@TraceguyRune 4 жыл бұрын
What I gather. If your password is 5 characters (a-z). A computer only needs 12,000,000 guesses to get it right, which should take less than a mute
@randomvideos3628
@randomvideos3628 7 жыл бұрын
How would it be (26)^5? If alice rolls a 26 sided dice 26 times, then each of the 26 outcomes should be associated with each letter. then it should be 26 factorial. isn't it?
@kennethkretschmer1027
@kennethkretschmer1027 3 жыл бұрын
Only if the encrypted message is 26 characters long.
@kineticstar
@kineticstar 5 жыл бұрын
But this only works from point to point. Computer A to Computer B. This is useless in a networked system because of the need of multiple people and devices having access to the Cypher. It is based of the German enigma machine from ww2 which was cracked due to unit capture and mathematical analysis. Unless you can scale it and keep it secure this will remains a pipe dream.
@toby9999
@toby9999 2 жыл бұрын
Then don't use it for network systems. It's a case of using the right tool for the job. It is the right tool for some jobs.
@imfasa
@imfasa 12 жыл бұрын
0:23 "and shared this with Bob"
@TempestTossedWaters
@TempestTossedWaters 12 жыл бұрын
But you can only send one message with that so what's the use really? It would often be more trouble than it's worth because you would have to share the key too.
@ineednochannelyoutube5384
@ineednochannelyoutube5384 6 жыл бұрын
Espionage reports and orders mostly.
@PostFormitable
@PostFormitable 12 жыл бұрын
Cause I would tell you also that the turns. Turns meaning whether the jump is to the left of the alphabet or to the right of the alphabet. So if I was encrypting the message Hello even more securely, I would tell you that the turn alternates every letter and it starts with a forward jump. Therefore you can decrypt it. E.g. Here decrypt this using the above: 5 1 9 16 21 M D U V J
@IrregularPineapples
@IrregularPineapples 12 жыл бұрын
More of this?
@habesha9779
@habesha9779 12 жыл бұрын
i think they already agreed on the all the shift.
@justinchan1045
@justinchan1045 10 жыл бұрын
Wait, it was that easy that whole time?
@Sukuraidogai
@Sukuraidogai 10 жыл бұрын
The problem is the key has to be as long as the message you want to send, and you can't share your key with someone else to send them the message without the possibility of jeapordizing the key's secrecy.
@ineednochannelyoutube5384
@ineednochannelyoutube5384 6 жыл бұрын
+Sukuraidogai And generating a truly random key is really bloody hard too.
@ineednochannelyoutube5384
@ineednochannelyoutube5384 4 жыл бұрын
@@superresistant0 Insufficient. In reality fissile matrrial is usally used.
@9668jake
@9668jake 12 жыл бұрын
i don't get it... how does bob solve it?
@masterbobp
@masterbobp 7 жыл бұрын
Isn't that the same idea as the monoalphabetic cipher ??
@johnroyce8650
@johnroyce8650 3 жыл бұрын
One-time pad = just basically a polyalphabetic Vigenere cipher with a truly random key long as the message, never reused.
@victorgrottil5303
@victorgrottil5303 10 жыл бұрын
Decrypt this 4-letter word: WQFD Good luck.
@vaibhavpatil2611
@vaibhavpatil2611 10 жыл бұрын
is it caeser, polyalphabetic or one time pad cipher ?
@lucaswilson898
@lucaswilson898 9 жыл бұрын
Thundy TheWeeaboo That's today...
@KhanAcademyLabs
@KhanAcademyLabs 12 жыл бұрын
it removes the key
Pseudorandom number generators | Computer Science | Khan Academy
6:41
Khan Academy Labs
Рет қаралды 353 М.
Jaidarman TOP / Жоғары лига-2023 / Жекпе-жек 1-ТУР / 1-топ
1:30:54
Какой я клей? | CLEX #shorts
0:59
CLEX
Рет қаралды 1,9 МЛН
The ULTIMATE One Time Pad Tutorial
14:11
Gary Ruddell
Рет қаралды 18 М.
Vernam Cipher (One-Time Pad)
11:21
MrBrownCS
Рет қаралды 49 М.
The Encryption That Can't Be Cracked: OTP
11:01
The Modern Rogue
Рет қаралды 178 М.
The Dome Paradox: A Loophole in Newton's Laws
22:59
Up and Atom
Рет қаралды 1,1 МЛН
Animated Explanation of the one-time pad
4:33
Canadian Coding
Рет қаралды 38 М.
Former KGB Spy Jack Barsky: One Time Pad
6:04
TAG Infosphere
Рет қаралды 8 М.
What is Computer Science?
11:14
Zach Star
Рет қаралды 1,6 МЛН