Skip to main content

All Questions

Tagged with
0 votes
1 answer
117 views

Can cryptographically secure randomness be used to implement one time pad?

if I use an one time pad key generated using a cryptographically secure random source like python's secret module , to encrypt a message, will the one time pad scheme be secure? I think the entire ...
vladmir illusinov's user avatar
3 votes
2 answers
141 views

Using $key^{th}$ multiple of $\pi$ as a one-time pad

With a key $k$ of sufficient length, say 128 bits, is it possible to use $k^{th}$ multiple of $\pi$ as a one-time pad? Please enlighten on the security as well as practical aspects (only if secure of ...
Ritesh Singh's user avatar
0 votes
0 answers
32 views

Are there any known problems performing a One-time pad with 2 keys stored separately - AKA 2 part Symmetric key exchange over TLS

If this is something that already has a name, please tell me to look at that, but I have not been able to find one yet. I am considering this process for storing some data securely. I want to ...
Matthew Carlson's user avatar
1 vote
1 answer
145 views

Why isn't data encrypted with mutiple ciphers?

Why isn't data encrypted with multiple uncompromised (so far) ciphers? Feel free to answer for a single private key for both and separate private keys. For example, encrypting data with TwoFish and ...
Tyler Spaeth's user avatar
1 vote
2 answers
275 views

Can a message and one time pad each encrypted with separate ciphers be weaker than the stronger of either cipher?

Assume you have: A truly random one time pad, $P$ A plain text message, $M$ Two symmetric ciphers, $C_S$ and $C_W$, where $C_S$ is always more secure than $C_W$ Assume the keys have already been ...
Tyler Spaeth's user avatar
0 votes
2 answers
252 views

Two possible plaintext's using OTP decryption

I am using this cipher-text c = 04 10 12 00 01 08 67 0A 19 65 0F 03 0A 00 with two possible keys ...
NimeQ's user avatar
  • 9
0 votes
4 answers
2k views

Why do one-time pads not provide message authentication?

It is often said that one-time pads do not provide message authentication. But, if you and I have a one-time symmetric key, and I send you a message, and it is not complete gibberish, is that itself ...
Lol4's user avatar
  • 25
4 votes
2 answers
372 views

Generate one-time-pad with pre-shared key and public randomness

I know very little about cryptography, so I apologize if the question does not make sense. Let's say we design a function $F(P, X) \rightarrow K$ that takes in a pre-shared private key $P$ and a ...
hklel's user avatar
  • 143
1 vote
1 answer
288 views

How to compare one time pad security and efficiency with AES?

It seems that the minimal size of Pseudorandom permutation (PRP) output is $128$ bits. In general, I'd like to see if there's any minimal size of the output of pseudorandom function (PRF) as well? for ...
Aydin's user avatar
  • 442
-3 votes
1 answer
80 views

One-time pad question (Old ciphers) [closed]

The plaintext SECRETIVE is encrypted using One Time Pad with key DDDDDDDDD. Which of the following is TRUE? The ciphertext will be the same as using Caesar cipher with key of 4 The ciphertext is the ...
Grace's user avatar
  • 29
-1 votes
2 answers
139 views

How to be sure to retrieve the good key when brute-forcing a cipher?

Imagine the case of the one-time pad. It is proved to be secure because the key could be everything. We have no guarantee that this key or that key was the one used while encrypting our data. ...
Tom Clabault's user avatar
4 votes
4 answers
703 views

Transferring Encrypted One-time pad over the internet

I was working with one-time pad, and as I understand , for one time pad to be 100% secure a key shouldn't be repeated. So assuming Alice and Bob have to exchange messages over the network secured over ...
Seaskyways's user avatar
1 vote
2 answers
809 views

OTP stream cipher

I am new to cryptography, and there is one thing that is bothering me. I hope you can kindly help me to understand. Let's imagine an attacker harvests the plaintext as well the ciphertext from a ...
mhibert's user avatar
  • 21
0 votes
3 answers
184 views

Defining Symmetric vs Asymmetric cryptosystems

I'm writing a project on the advantages and disadvantages of symmetric vs asymmetric cryptosystems. At the moment I am trying to define both systems using mathematical notation. Under the heading "...
Charlie's user avatar
  • 11
5 votes
1 answer
2k views

A "one time pad" can be thought of a Vigenere cipher with

A "One Time Pad" can be thought of a Vigenere cipher with... An infinitely long key A secure symmetric key Multiple ciphertext alphabets A columnar transposition I had this question come up ...
pi-e's user avatar
  • 53

15 30 50 per page