David has over 40 years of industry experience in software development and information technology and a bachelor of computer science
Saving Our Souls
You don't have to think very hard to realize that in this day and age, we have a significant need for security. We live on the Internet. We buy things from ecommerce websites like Amazon and Staples, we communicate through email websites like Google and Outlook, and we post details about our lives on social media websites like Facebook and LinkedIn. The fact is we could potentially bare our souls to the world. So what's stopping this information from being exploited? What is it that stops the unthinkable from happening? Well, there are many technologies in place that do just that. One of the most important is encryption, and a specific type is one-time pad.
What is Encryption?
Simply put, Encryption is about conversion. Information in one form (usually human-readable) is converted to another (not usually human-readable). The process is mathematically based, and makes use of some external information, known as a key, to perform the conversion. There are several different types of encryption, and they are used for many things. Common examples include protecting the password on your cell phone, securing the communications between yourself and ecommerce websites, and hiding sensitive email. In each case, it quietly does its thing, behind the scenes.
What is One-Time Pad Encryption?
One-time pad is a unique encryption process. Like most, it uses a key to encrypt and decrypt. However, in this process, a key is generated randomly to encrypt the messages for a specific session. To decrypt, the same key is used. Once the session is complete, a new key is generated. This gives the algorithm a random element that ensures that there is no relationship between the key, and consecutive encrypted messages. As a result, this process is considered mathematically unbreakable. So far, this has proven to be true, but with one major caveat, which we'll get to in a moment.
How Does One-Time Pad Encryption Work?
The process starts by generating a sequence of random numbers or characters, the length of which is determined by the size of the messages to be sent. This sequence is then written down on a pad (which is where the name comes from), or some recording device in today's world. It is then forwarded to anyone that may need to decrypt the messages. To prepare a message for transmission, each number or character in the message gets encrypted with the key, using a bit-wise exclusive-OR (XOR) operation. The encrypted message is then sent, and the receiving party decrypts using the same key and bit-wise XOR operation.
Bit-wise XOR works on the output one bit at a time, and behaves in the following fashion:
|Operand 1||Operator||Operand 2||Result|
The interesting thing about bit-wise XOR is that it is reversible. If you take the output and bit-wise XOR it again, you get back your original value.
What are the Advantages and Disadvantages of One-Time Pad Encryption?
There are two advantages for one-time pad encryption. First, the key is random, so there is no relationship, mathematical or otherwise, between the key and the output. This makes it extremely difficult to attack. Second, the key is only used for one session. This adds an additional random element to the proceedings which adds difficulty to any attack. The disadvantage of the encryption is the shared key. Because both the sender and receiver must have access to the key, securing it for transport becomes a problem.
Encryption is a process that convert information in one form to another. One-time-pad is an encryption process that uses random key, that changes from session to session. The random nature of the key and the fact that each session uses a unique key make it harder to crack the encryption. The disadvantage is that the key is shared and must be securely transferred.
To unlock this lesson you must be a Study.com Member.
Create your account
Register to view this lesson
Unlock Your Education
See for yourself why 30 million people use Study.com
Become a Study.com member and start learning now.Become a Member
Already a member? Log InBack