All Questions
Tagged with symmetric one-time-pad
20
questions
0
votes
1
answer
117
views
Can cryptographically secure randomness be used to implement one time pad?
if I use an one time pad key generated using a cryptographically secure random source like python's secret module , to encrypt a message, will the one time pad scheme be secure?
I think the entire ...
3
votes
2
answers
141
views
Using $key^{th}$ multiple of $\pi$ as a one-time pad
With a key $k$ of sufficient length, say 128 bits, is it possible to use $k^{th}$ multiple of $\pi$ as a one-time pad?
Please enlighten on the security as well as practical aspects (only if secure of ...
0
votes
0
answers
32
views
Are there any known problems performing a One-time pad with 2 keys stored separately - AKA 2 part Symmetric key exchange over TLS
If this is something that already has a name, please tell me to look at that, but I have not been able to find one yet.
I am considering this process for storing some data securely. I want to ...
1
vote
1
answer
145
views
Why isn't data encrypted with mutiple ciphers?
Why isn't data encrypted with multiple uncompromised (so far) ciphers? Feel free to answer for a single private key for both and separate private keys.
For example, encrypting data with TwoFish and ...
1
vote
2
answers
275
views
Can a message and one time pad each encrypted with separate ciphers be weaker than the stronger of either cipher?
Assume you have:
A truly random one time pad, $P$
A plain text message, $M$
Two symmetric ciphers, $C_S$ and $C_W$, where $C_S$ is always more secure than $C_W$
Assume the keys have already been ...
0
votes
2
answers
252
views
Two possible plaintext's using OTP decryption
I am using this cipher-text
c = 04 10 12 00 01 08 67 0A 19 65 0F 03 0A 00
with two possible keys
...
0
votes
4
answers
2k
views
Why do one-time pads not provide message authentication?
It is often said that one-time pads do not provide message authentication. But, if you and I have a one-time symmetric key, and I send you a message, and it is not complete gibberish, is that itself ...
4
votes
2
answers
372
views
Generate one-time-pad with pre-shared key and public randomness
I know very little about cryptography, so I apologize if the question does not make sense.
Let's say we design a function $F(P, X) \rightarrow K$ that takes in a pre-shared private key $P$ and a ...
1
vote
1
answer
288
views
How to compare one time pad security and efficiency with AES?
It seems that the minimal size of Pseudorandom permutation (PRP) output is $128$ bits. In general, I'd like to see if there's any minimal size of the output of pseudorandom function (PRF) as well? for ...
-3
votes
1
answer
80
views
One-time pad question (Old ciphers) [closed]
The plaintext SECRETIVE is encrypted using One Time Pad with key DDDDDDDDD. Which of the following is TRUE?
The ciphertext will be the same as using Caesar cipher with key of 4
The ciphertext is the ...
-1
votes
2
answers
139
views
How to be sure to retrieve the good key when brute-forcing a cipher?
Imagine the case of the one-time pad. It is proved to be secure because the key could be everything. We have no guarantee that this key or that key was the one used while encrypting our data. ...
4
votes
4
answers
703
views
Transferring Encrypted One-time pad over the internet
I was working with one-time pad, and as I understand , for one time pad to be 100% secure a key shouldn't be repeated. So assuming Alice and Bob have to exchange messages over the network secured over ...
1
vote
2
answers
809
views
OTP stream cipher
I am new to cryptography, and there is one thing that is bothering me. I hope you can kindly help me to understand.
Let's imagine an attacker harvests the plaintext as well the ciphertext from a ...
0
votes
3
answers
184
views
Defining Symmetric vs Asymmetric cryptosystems
I'm writing a project on the advantages and disadvantages of symmetric vs asymmetric cryptosystems. At the moment I am trying to define both systems using mathematical notation. Under the heading "...
5
votes
1
answer
2k
views
A "one time pad" can be thought of a Vigenere cipher with
A "One Time Pad" can be thought of a Vigenere cipher with...
An infinitely long key
A secure symmetric key
Multiple ciphertext alphabets
A columnar transposition
I had this question come up ...