Exhibit 26 of 37 1882 · Theoretical Provably Secure*

One-Time Pad

The only cipher proved mathematically unbreakable — and nearly impossible to use correctly

InventorFrank Miller (1882) · Vernam (1917) · Shannon (1949)
Year1882 / 1917
Key TypeRandom key same length as message (used once)
Broken ByNever — if rules followed. VENONA: key reuse exploitation
Modern LessonInformation-theoretic security (Shannon, 1949)
📜Historical Context

Frank Miller described a one-time pad system in 1882. Gilbert Vernam patented a teletype version in 1917. But it was Claude Shannon who proved in 1949 that the OTP achieves perfect secrecy — ciphertext reveals absolutely nothing about the plaintext to an attacker with unlimited computing power.

The VENONA project showed exactly what happens when the rules are broken: Soviet signals officers reused key pages under WWII supply pressure. The NSA decoded thousands of messages and identified Julius Rosenberg, Klaus Fuchs, and other Soviet agents.

⚙️How It Works
Encryption: C = P XOR K
Decryption: P = C XOR K

Example:
Plain:  H  E  L  L  O  = 07 04 11 11 14
Key:    X  M  C  K  L  = 23 12 02 10 11 (random)
Cipher: 30 16 13 21 25 mod 26 = E Q N V Z

Three requirements for perfect secrecy:
1. Key must be truly random (not pseudorandom)
2. Key must be as long as the message
3. Key must never be reused
4. Key must be kept secret

Violate any condition → security collapses
H E L L O Plain 07 04 11 11 14 + + + + + Key 23 12 02 10 11 mod 26 Cipher 04 16 13 21 25 E Q N V Z
One-Time Pad: each letter is added to a random key letter mod 26 — perfectly secret if the key is truly random and never reused
💀How It Was Broken
🔒

Shannon's proof (1949): For any ciphertext C and any possible plaintext P, P(plaintext=P | ciphertext=C) = P(plaintext=P). The ciphertext provides zero information about the plaintext. An attacker with unlimited computing power cannot do better than random guessing.

VENONA: Key Reuse Attack
Complexity: Moderate if pads reused

C1 XOR C2 = P1 XOR P2. If two messages are encrypted with the same key, XORing the ciphertexts eliminates the key and produces the XOR of the plaintexts. With enough crib-based guessing, both plaintexts can be recovered. The Soviets reused pads in 1942-1943 under wartime supply pressure — giving the NSA its entry point.

🔬What It Teaches Modern Cryptography
Concept from One-Time PadModern Evolution
Perfect secrecy (Shannon, 1949)Information-theoretic vs computational security: the fundamental distinction
XOR as cipher operationEvery modern stream cipher uses XOR with a keystream
Key = message lengthThe impracticality drove development of public-key cryptography (RSA, DH)
Key reuse is catastrophicNonces, IVs, session keys: modern protocols prevent key reuse by design
📝Worked Example
Message: A T T A C K   (6 letters)
As numbers (A=0): 0  19  19  0  2  10

Random key:       7  14   3  8  25  16
(from true random source — dice, radiation, etc.)

Encrypt — add mod 26:
  A(0)  + key(7)  = 7  mod 26 = 7  → H
  T(19) + key(14) = 33 mod 26 = 7  → H
  T(19) + key(3)  = 22 mod 26 = 22 → W
  A(0)  + key(8)  = 8  mod 26 = 8  → I
  C(2)  + key(25) = 27 mod 26 = 1  → B
  K(10) + key(16) = 26 mod 26 = 0  → A

Ciphertext: H H W I B A

Decrypt — subtract mod 26:
  H(7)  − key(7)  = 0  mod 26 = 0  → A  ✓
  H(7)  − key(14) = −7 mod 26 = 19 → T  ✓

Why unbreakable: HHWIBA could decrypt to
any 6-letter message with some key.
Without the key, all plaintexts are equally likely.
🏛️Related Exhibits
  • Enigma Machine — Rotor cipher that traded perfect secrecy for practicality
  • Lorenz Cipher — XOR-based teleprinter cipher inspired by OTP principles
  • Vigenère Cipher — Repeating-key polyalphabetic: what happens when the key is shorter than the message
Quick Facts
Exhibit26 of 37
Era1882 · Theoretical
SecurityProvably Secure*
InventorFrank Miller (1882) · Vernam (1917) · Shannon (1949)
Year1882 / 1917
Key TypeRandom key same length as message (used once)
Broken ByNever — if rules followed. VENONA: key reuse exploitation
← Previous Confederate Dictionary Code