Reply to post: Better, but...

Swiss spies knew about Crypto AG compromise – and kept it from govt overseers for nearly 30 years

Claptrap314 Silver badge
Boffin

Better, but...

It's refreshing to see an article of this sort where the "why didn't they just roll their own--it's easy!" comment(s) appear to be missing. So: it's time for the second great fallacy of crypto: one-time pads fix everything.

It is true that perfect one-time pads are cryptographically unbreakable. The weakness of a one-time pad system is not in the keys, but in the key distribution. You see, the key itself is a type of message, and you need to get that message to both ends of a conversation you want to have. Now, in order to securely transmit a message between two parties, you just.....encrypt... Nope, you cannot use encryption. For the purposes of these discussions, the key is itself a plaintext message which has to be transmitted somehow.

Certainly, if your 64Gb of random noise gets picked up by a TLA, they don't know how those bits are being interpreted. They still have to understand the underlying crypto system that is going to convert those bits into a key. But again, that it true for ANY crypto system. We have to assume that this is known.

I am certainly not suggesting that one-time pads are useless. But they are not practical for many, many use cases.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon