22.01.2015 Views

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Modern Usage of “Old” One-Time Pad<br />

Mariusz Borowski, Marek Leśniewicz<br />

Cryptology Division, <strong>Military</strong> Communication Institute, Zegrze, Pol<strong>and</strong>,<br />

{m.borowski, m.lesniewicz}@wil.waw.pl<br />

Abstract: Top comm<strong>and</strong>s of the arm forces <strong>and</strong> some special military <strong>and</strong> government institutions<br />

need perfect security for exchanging between them “TOP SECRET” information. Security of such<br />

information is not limited by time. Only the one-time pad (perfect) cipher may be used to fulfill<br />

the requirements. Realization of OTP cipher machines has changed for decades. Now capability<br />

to hardware generation of binary r<strong>and</strong>om sequences with the potential output rate 100 Mbit/s<br />

eliminates the restriction connected with availability of very long one-time keys. Continuously<br />

generating the sequence (or one-time keys) with a bit rate 100 Mbit/s <strong>and</strong> its direct, lossless<br />

recording to mass storage, the new hardware generator will be able to produce a little more<br />

than 1 TB per day. OTP cipher machines have to be supported by a trusted data management<br />

<strong>and</strong> couriering system.<br />

Keywords: a one-time pad, a hardware r<strong>and</strong>om bit generator, entropy, r<strong>and</strong>omness, Markow chains<br />

I. Introduction<br />

Diplomacy, military top comm<strong>and</strong>s <strong>and</strong> some special government agencies<br />

need ever lasting absolute security <strong>and</strong> privacy. Interception of some<br />

“TOP SECRET” plaintext by hostile state or organization can prove destructive<br />

in two months as wall as in a hundred years. The requirement of the perfect cipher<br />

usage is obvious for the institutions. It is important to recall that messages that<br />

were encrypted in the 1950’s with ‘state of the art’ imperfect cipher machines, <strong>and</strong><br />

were kept archived by the adversary (which actually happened) are now generally<br />

broken within a few seconds, minutes or some hours at the most. On the other h<strong>and</strong><br />

the messages that were sent 60 years ago with any realization of perfect ciphering<br />

will stay unbreakable for ever if the keys have been destroyed.<br />

Methods of realizating the perfect ciphering have changed by decades from<br />

a pencil-<strong>and</strong>-paper version to a today’s PC computer system equipped with modern<br />

software <strong>and</strong> provided other then confidentiality cryptographic services. It is<br />

interesting that all the methods of realizating the perfect ciphering have the same<br />

perfect security. Obviously perfect security is not for free. The perfect cipher requires<br />

r<strong>and</strong>om keys as long as the plaintext, a data management system <strong>and</strong> a robust,<br />

trusted key distribution system. Shown in chapter 4 the possibility for hardware

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!