SlideShare ist ein Scribd-Unternehmen logo
1 von 25
One Time Pad (OTP) Usage SSG Ryan J. Gomez – U.S. Army Army Basic Instructors Course   "If you think cryptography can solve your problem, then you don't understand your problem and you don't understand cryptography."    -- Bruce Schneier
Terminal Learning Objective Terminal Learning Objective: Action: Correctly identify and utilize a OTP. Condition: Given a OTP, correct keying material, and scratch paper & writing utensil in a classroom environment. Standard: Decrypt and Encrypt a OTP message.
Safety, Risk, and Environmental Considerations Safety Requirements: None Risk Assessment: Low Environmental Considerations: None
Evaluation Evaluation: Correctly encrypt and decrypt a message using an OTP.
Enabling Learning Objective (ELO) ELO A: Cryptographic history and terminology.
History of Cryptography and OTP Usage * The earliest methods of cryptography were altered hieroglyphics attempting to pass secret messages. * WWII messages were primarily mechanically generated. * Modern cryptography utilizes mathematically based encryption.
Overview of Cryptography  Terminology ,[object Object],[object Object],[object Object],[object Object]
Overview of Cryptography  Terminology (Cont.) ,[object Object],[object Object],[object Object],[object Object]
Enabling Learning Objective ,[object Object]
Information Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Information Security ,[object Object],[object Object],[object Object],[object Object],[object Object]
Types of Cryptographic Systems Secret Codes ,[object Object],Code Phrase True Meaning My coffee is cold Pass the cream Launch the missiles Don’t launch the missiles
Types of Cryptographic Systems Ciphers ,[object Object],[object Object],[object Object],A  B  C  D  E  F  G  H  I  J  K  L  M  1  2  3  4  5  6  7  8  9  A  B C  . . .
Types of Cryptographic Systems One-Time Pads ,[object Object],[object Object],[object Object],Decrypted Text 14  07  09  06  10  02  25  13  17  08  15 One-Time Pad - Shift each encrypted letter x places to the right A B C D E F G H I J K L M N O P Q R S T U V W X Y Z fazmyqbgnke Encrypted Message This is a test
One Time Pad The above is an example of a page from a standard one time pad.  The encryption & decryption keys are impossible to decipher when generated using entirely random keys.
Enabling Learning Objective ,[object Object]
OTPs in the COE ,[object Object],[object Object],[object Object]
Check on Learning ,[object Object],[object Object],[object Object]
One Time Pad ,[object Object]
Encrypt and Decrypt an OTP Message ,[object Object],[object Object],[object Object]
Encrypt an OTP Message ,[object Object],[object Object],[object Object],[object Object],[object Object]
Decrypt an OTP Message ,[object Object],[object Object]
Example ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Demonstration ,[object Object],[object Object],Today's OTP: PQYQ FWYC XQVV EYPL GJNS WCQI PPXR LQVZ AZSN ZEVL AJWA XHUN GUWU EOTC RMGP WSRE Today's Messages Encrypt: PAININBRAIN Decrypt: LYLD NJEN LB A B C D E F G H I 1 2 3 4 5 6 7 8 9 J K L M N O P Q R 10 11 12 13 14 15 16 17 18 S T U V W X Y Z 19 20 21 22 23 24 25 26
Summary ,[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Cryptography for developers
Cryptography for developersCryptography for developers
Cryptography for developers
Kai Koenig
 
Vladyslav Hamolia "How to choose ASR (automatic speech recognition) system"
Vladyslav Hamolia "How to choose ASR (automatic speech recognition) system"Vladyslav Hamolia "How to choose ASR (automatic speech recognition) system"
Vladyslav Hamolia "How to choose ASR (automatic speech recognition) system"
Lviv Startup Club
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
adrigee12
 
Cryptography and encryption
Cryptography and  encryptionCryptography and  encryption
Cryptography and encryption
Ancy Mariam Babu
 

Was ist angesagt? (20)

Cryptology - Antônio Lacerda
Cryptology - Antônio LacerdaCryptology - Antônio Lacerda
Cryptology - Antônio Lacerda
 
Applied Cryptography
Applied CryptographyApplied Cryptography
Applied Cryptography
 
Cryptography for developers
Cryptography for developersCryptography for developers
Cryptography for developers
 
Cryptography ppt ,computer system security. PPT
Cryptography ppt ,computer system security. PPTCryptography ppt ,computer system security. PPT
Cryptography ppt ,computer system security. PPT
 
Vladyslav Hamolia "How to choose ASR (automatic speech recognition) system"
Vladyslav Hamolia "How to choose ASR (automatic speech recognition) system"Vladyslav Hamolia "How to choose ASR (automatic speech recognition) system"
Vladyslav Hamolia "How to choose ASR (automatic speech recognition) system"
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
 
Classical Encryption
Classical EncryptionClassical Encryption
Classical Encryption
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Classical Encryption Techniques
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
 
Cypher technique
Cypher techniqueCypher technique
Cypher technique
 
Cryptography Presentation
Cryptography PresentationCryptography Presentation
Cryptography Presentation
 
Cryptography basices
Cryptography basicesCryptography basices
Cryptography basices
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding informationCryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding information
 
Cryptography
CryptographyCryptography
Cryptography
 
Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)
 
Cryptography and encryption
Cryptography and  encryptionCryptography and  encryption
Cryptography and encryption
 
Pycon Korea 2020
Pycon Korea 2020 Pycon Korea 2020
Pycon Korea 2020
 

Ähnlich wie Otp2

Senior Research Final Draft3
Senior Research Final Draft3Senior Research Final Draft3
Senior Research Final Draft3
Coleman Gorham
 

Ähnlich wie Otp2 (20)

doc3.pdf
doc3.pdfdoc3.pdf
doc3.pdf
 
paper3.pdf
paper3.pdfpaper3.pdf
paper3.pdf
 
sheet3.pdf
sheet3.pdfsheet3.pdf
sheet3.pdf
 
paper10.pdf
paper10.pdfpaper10.pdf
paper10.pdf
 
lecture2.pdf
lecture2.pdflecture2.pdf
lecture2.pdf
 
sabith.pptx
sabith.pptxsabith.pptx
sabith.pptx
 
Introduction to cryptography
Introduction to cryptographyIntroduction to cryptography
Introduction to cryptography
 
Ch02...1
Ch02...1Ch02...1
Ch02...1
 
Data Protection Techniques and Cryptography
Data Protection Techniques and CryptographyData Protection Techniques and Cryptography
Data Protection Techniques and Cryptography
 
SMS Encryption Using One-Time Pad Cipher
SMS Encryption Using One-Time Pad CipherSMS Encryption Using One-Time Pad Cipher
SMS Encryption Using One-Time Pad Cipher
 
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
 
security system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptxsecurity system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptx
 
Cryptography chap#6.pptx
Cryptography chap#6.pptxCryptography chap#6.pptx
Cryptography chap#6.pptx
 
ch09_rsa_nemo.ppt
ch09_rsa_nemo.pptch09_rsa_nemo.ppt
ch09_rsa_nemo.ppt
 
Ppt ns
Ppt nsPpt ns
Ppt ns
 
Introduction to encryption
Introduction to encryptionIntroduction to encryption
Introduction to encryption
 
Cryptography- "A Black Art"
Cryptography- "A Black Art"Cryptography- "A Black Art"
Cryptography- "A Black Art"
 
cryptography_priceton_university_fall_2007.ppt
cryptography_priceton_university_fall_2007.pptcryptography_priceton_university_fall_2007.ppt
cryptography_priceton_university_fall_2007.ppt
 
Senior Research Final Draft3
Senior Research Final Draft3Senior Research Final Draft3
Senior Research Final Draft3
 

Otp2

  • 1. One Time Pad (OTP) Usage SSG Ryan J. Gomez – U.S. Army Army Basic Instructors Course "If you think cryptography can solve your problem, then you don't understand your problem and you don't understand cryptography." -- Bruce Schneier
  • 2. Terminal Learning Objective Terminal Learning Objective: Action: Correctly identify and utilize a OTP. Condition: Given a OTP, correct keying material, and scratch paper & writing utensil in a classroom environment. Standard: Decrypt and Encrypt a OTP message.
  • 3. Safety, Risk, and Environmental Considerations Safety Requirements: None Risk Assessment: Low Environmental Considerations: None
  • 4. Evaluation Evaluation: Correctly encrypt and decrypt a message using an OTP.
  • 5. Enabling Learning Objective (ELO) ELO A: Cryptographic history and terminology.
  • 6. History of Cryptography and OTP Usage * The earliest methods of cryptography were altered hieroglyphics attempting to pass secret messages. * WWII messages were primarily mechanically generated. * Modern cryptography utilizes mathematically based encryption.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. One Time Pad The above is an example of a page from a standard one time pad. The encryption & decryption keys are impossible to decipher when generated using entirely random keys.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.