Key Takeaway:

Encrypting messages is crucial for protecting our privacy and humanity, and current methods of encryption use integer factorization, which can take billions of years to decrypt. However, the one-time pad (OTP) cipher, the world’s only unbreakable cipher, offers perfect security due to its real-world simplicity. The OTP cipher uses Hardware Random Number Generators (RNGs) to generate random numbers, making the encryption process non-digital. The true strength of the OTP cipher lies in the fact that there are two unknowns – the encrypted text and the random numbers of the pad. It is mathematically impossible to solve this encryption, and perfect security is only ensured if one follows all OTP rules. OTP encryption was used during WW2 and the Cold War, and agencies like MI6 and the Russian Security Ministry still use it today. As the physicality of humans bleeds into the machine, the future of information security may depend on the physicality of humans and the ability to protect sensitive information.


How strange it is to think that some part of us exists online. Who we are no longer has a purely physical answer. Our work, thoughts, relationships, and obsessions exist online, extensions of ourselves that make it possible for people to get to know us without ever having to occupy the same rooms as us. Or even the same country. This is the transition of the human to the cyborg — we are starting to shift more and more of our lives onto our machines.

Encrypting our messages, then, is about more than just protecting our money. It’s about protecting some aspect of our humanity as well. And up until now we thought our information was very well protected. Cryptographers have come up with clever ways to keep our text messages and bank information safe from criminals and agencies. But all of that will someday change. As a seemingly inevitable computer revolution looms on the horizon, it casts an uncertain shadow on the privacy of our lives. By some estimates, it may already be too late to keep our sensitive information safe.

Current methods of encryption use something known as integer factorization. The security of this method is based on a straightforward mathematical problem: given a large number, what are the factors which multiply to give you that number? It’s simple enough in theory, but in practice it can take even the world’s most powerful supercomputers billions of years to answer. For information using the Advanced Encryption Standard (AES) of 128, 192, or 256 bit keys, it would take the combined computational power on all of Earth trillions of years to decrypt even the smaller 128 bit key. This kind of encryption is used for iPhone files and websites using HTTPS (like Medium).

Yet even this kind of encryption is at risk of becoming obsolete. As supercomputers advance and people have at their disposal ever greater amounts of computational power, experts understand that current internet encryption will not remain invulnerable forever. Perhaps the biggest threat to this security method bears the face of the quantum computer. Finding the factors of large numbers is a monumental task for a classical computer, but it’s not much of a problem at all for quantum machines.

In fact, throughout the history of ciphers and cryptography, only one method of encryption has ever been mathematically proven to offer perfect security. It is the world’s only unbreakable cipher. Yet its strength lies not in its digital complexity, but in its real-world simplicity.

Image for post
Mathematical proof by Claude Shannon that the OTP cipher is unbreakable.

The cipher is the one-time pad (OTP), so called because a pad of numbers can only be used once and must then be disposed of afterward. While there are many variations of the OTP cipher — some using binary, some grouping letters into sets, some using a Vigenere table, and so on — I’ll give one of the easier encryption methods below.

We begin by first creating our OTP of numbers. It’s important not to use an everyday number generator to do this. Computers rely on mathematics to come up with their “random” numbers, but patterns are prevalent throughout math. What seems like random numbers will be vulnerable to patterns if they’re generated from a normal computer program. As this is the most important step in the OTP encryption process, you’ll want to use Hardware Random Number Generators (RNG’s). These kind of generators are based on physical events such as electrical noise from semiconductors or the passage of a photon through a filter. Alternatively, ten-sided dice can also be used to roll random numbers, making the entire encryption process non-digital.

An OTP of random numbers will then look something like this:

Image for post

One of the most inconvenient aspects of the OTP cipher is that both the sender and recipient of a message must have an exact copy of the numbers. Anyone who has access to this can decrypt your message.

Now let’s imagine we want to send the word “quasar”. We first find each letter’s place in the alphabet. Q is 17 in the alphabet, u is 21, and so on. At the end we have this string of numbers to represent the word “quasar”: 17-21-1-19-1-18. Using modular arithmetic, this string of 6 numbers will be added to the first 6 numbers in our OTP. 17 is added to 5, 21 to 19, 1 to 6, etc. The modular arithmetic is in place so that we don’t end up with results larger than the number of letters in the alphabet, which is 26. So normally 21 + 19 = 40, but with modular addition the 40 becomes 14.

Image for post
Adding the 6 numbers of “quasar” with the first 6 numbers of our OTP gives us a new string of 6 numbers, seen at the bottom.

With our new set of numbers, we find the corresponding letters of the alphabet. The end result are the letters “VNGHAC” which are now the OTP encrypted version of “QUASAR”.

Image for post

This encrypted word shows how an OTP cipher is more efficient than something like a Cesar cipher. With Cesar encryption “QUASAR” could become something like “XBHZHY”, in which the letters are shifted by a certain amount. But their frequency is maintained. Because there are two letter a’s in the word quasar, there appear two letter h’s in the Cesar encryption. This is a major weakness. It means someone trying to decrypt the message will use their knowledge of letter frequency to figure out certain letters, compromising the security of the entire message. With OTP encryption, the word quasar may have multiple a’s yet the final encrypted word doesn’t repeat a single letter. Knowledge of letter frequency won’t be of any help.

The true strength of the OTP cipher, however, lies in the fact that there are two unknowns — the first being the encrypted text and the second being the random numbers of the pad. It is mathematically impossible to solve this encryption no matter how much time or computational power anyone might have. This perfect security is only ensured if one follows all of the OTP rules. Do not reuse numbers under any circumstances, destroy the OTP after use, and make sure the numbers are truly random.

OTP encryption was used during WW2 and the Cold War. Agencies like MI6 and the Russian Security Ministry still use it to this day. It’s not that a cipher like the One-time Pad is the future of security, but there is something poetic in realizing that the world’s most impenetrable form of encryption relies not on digital and computational power, but on simple actions between two people.

Perfect secrecy can’t be found in the digital realm; but it does lie somewhere out here in the real world, taking the form of a piece of paper and a handful of dice. As the physicality of human beings begins to bleed into the machine, what does it say about the safety and security of our information going forward? Will our future descendants belong to themselves alone — or to someone else?

Contributor

Recently Published

Key Takeaway: A study has found that humble leaders can become more promotable by growing others through a “humility route”. Human capital theory suggests that employees’ value can be enhanced by investing in their knowledge, skills, and abilities. Humble leaders focus on the learning and growth of their followers, creating human capital value for themselves. […]

Top Picks

Key Takeaway: The current economic climate is particularly concerning for young people, who are often financially worse off than their parents. To overcome this, it is important to understand one’s financial attachment style, which can be secure, anxious, or avoidant. Attachment theory, influenced by childhood experiences and education, can help shape one’s relationship with money. […]
Key Takeaway: Wellness culture, which claims to provide happiness and meaning, has been criticized for its superficial focus on superficial aspects like candles and juice cleanses. Psychological research suggests that long-term wellbeing comes from a committed pursuit of both pleasure and meaning. Martin Seligman’s Perma model, which breaks wellbeing into five pillars: positive emotions, engagement, […]
Key Takeaway: Quantum computing, which uses entanglement to represent information, has the potential to revolutionize everyday life. However, the development of quantum computers has been slow due to the need to demonstrate an advantage over classical computers. Only a few notable quantum algorithms have been developed, such as the BB84 protocol and Shor’s algorithm, which […]
Key Takeaway: China’s leaders have declared a GDP growth target of 5% in 2024, despite facing economic problems and a property crisis. The country’s rapid economic growth has been attributed to market incentives, cheap labor, infrastructure investment, exports, and foreign direct investment. However, none of these drivers are working effectively. The government’s determination to deflate […]
Key Takeaway: Neuralink, founded by Elon Musk, aims to implant a brain-computer interface (BCI) in people’s brains, allowing them to control computers or phones by thought alone. This technology holds the promise of alleviating human suffering and allowing people with disabilities to regain lost capacities. However, the long-term aspirations of Neuralink include the ability to […]

Trending

I highly recommend reading the McKinsey Global Institute’s new report, “Reskilling China: Transforming The World’s Largest Workforce Into Lifelong Learners”, which focuses on the country’s biggest employment challenge, re-training its workforce and the adoption of practices such as lifelong learning to address the growing digital transformation of its productive fabric. How to transform the country […]

Join our Newsletter

Get our monthly recap with the latest news, articles and resources.

Login

Welcome to Empirics

We are glad you have decided to join our mission of gathering the collective knowledge of Asia!
Join Empirics