Smart browsing tip – If you arrived at this page from a search engine, click here to go to the Spy & CounterSpy home page, which gives you full access to all the free features at our site.

...

...

Spy & CounterSpy logo

How to use one-time pads
for secret communications...

Copyright ©1998 Lee Adams. All rights reserved. Updated October 11th, 1998
     There is only one cipher system that cannot be cracked by the FBI or NSA – or by anyone else for that matter. That system is the one-time pad.
     A message encrypted using a one-time pad cannot be broken because the encryption key is a random number and because the key is used only once.
     A proven system.  Intelligence agencies routinely use many different kinds of encryption systems – ranging from mechanical devices to invisible inks to computer software – but for mission critical messages that must be 100% secure they always use a one-time pad.
     At the height of the cold war during the fifties and sixties, Soviet spies in the USA used one-time pads to communicate with their controllers, usually located inside Russian embassies and consulates. Not a single message was cracked by the FBI or NSA. And none of those messages ever will be cracked.
     Used by the best.  The one-time pad system is still being used today by intelligence agencies like Britain's MI.6, Germany's BND, France's DGSE, Russia's MBRF, and China's Cheng Pao K'o.
     One-time pads are also being used by resistance groups like Northern Ireland's IRA, France's Action Direct, Uruguay's Tupamaros, Algeria's GIA, Lebanon's Hezbollah, Peru's Shining Path, and Argentina's Monteneros.
     Inside this article.  This article provides practical information that you can use to set up your own one-time pad encryption system. The article describes subtle refinements that you won't find in other books or articles. Our information comes direct from people with hands-on experience. Our two sources are an ex-MI.6 intelligence officer and a former member of Peru's Shining Path guerrillas. (Return to our home page and click on About Us for more on this.)
     After studying this article you will have all the knowledge you need to set up a 100% secure system of communication that cannot be cracked by the FBI, BATF, DEA, NSA, or any other organization.
     If you're playing by Big Boys' Rules, the one-time pad will keep you out of the internment camps.
     BACKGROUND – Cryptography as a science was originally developed by the Arabs. The year 1412 saw the publication of Subh al-a 'sha, a 14-volume encyclopedia written by Shihab al-Din al-Qalqashandi. The text described transposition and substitution ciphers. The Arabs were light-years ahead of the Europeans because their mathematics were more advanced – and cryptography relies heavily on math. While the Europeans were still struggling with Roman Numerals, the Arabs had already discovered the principle of zero.
     The word cipher is derived from the Arab word al cifr, literally meaning nothing or zero.
     The one-time pad system itself was perfected in 1917 during the first world war. Random keys were written on sheets of paper that were glued together to form a pad. Each key was used only once – hence the name, one-time pad.


...

Logo

Step 1:  Create the key...
     The core of the one-time pad system is the random key. A key is a block of numbers that is used to transform your original message (the plaintext) into a coded message (the ciphertext).
Before you can begin to work with a one-time pad system, you need to create a random key. Before you can create a random key, you need a method for converting alphabet characters into numbers.
     The chart below illustrates a workable system that is simple and easily remembered.
     BACKGROUND – Government agencies use code-books containing often-used words and phrases that are represented by numbers. For example, rather than encrypting a phrase like safe house 4 to 0916 2698 1402 2004 1301, the coding clerk might simply use 0219.
     Spies and agents, on the other hand, cannot afford to carry incriminating evidence like bulky code-books, so they use instead the simplified conversion method shown below and spell out every word in full.

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26

     Now you're ready to create a key. First, write down a series of random alphabet characters, such as HLMSEZRBHPSJOTDW.
     To make the key easier to work with, break it into blocks of two characters each, thus HL MS EZ RB HP SJ OT DW
     Now use the conversion table shown above to convert the alphabet characters into numbers. For example H=08 and L=12, so the first block HL becomes 0812.
     The result is 0812 1319 0526 1802 0816 1910 1520 0423.
     You've just created your first one-time pad. This is also called the key. (Normally you would create a much longer key than this, enabling you to send a number of messages before the key is used up.) As you use the blocks of numbers to encrypt messages, you would cross out each block you've used. This will ensure that you use a block only once. (We'll simulate crossing out a block by graying it.)
     0812 1319 0526 1802 0816 1910 1520 0423
     You would normally create two copies of the key and provide one copy to your intended recipient.


Use the character
X to represent a
period in your
plaintext.

Step 2:  Format your message...
     Suppose that the message you want to send is MY SECRET.
     You would next format your message into blocks of two characters each, yielding MY SE CR ET.
     Next, use the conversion chart above to convert the alphabet characters into numbers. In the example we're using M=13 and Y=25, so the first block would be 1325.
     The entire string becomes 1325 1905 0318 0520. You can now see how using blocks makes the text increasingly difficult for anyone to crack, even at this stage.

Guidelines...
     Rule 1 – Numbers.  Spell out all numbers in full in your plaintext. For example, 365 becomes THREE SIX FIVE.
     Rule 2 – Negatives.  Always add emphasis to the word NOT in your plaintext. For example, you would write AGENT ALPHA NOT RPT NOT AVAILABLE FOR MEETING TUESDAY, where RPT stands for REPEAT.
     Rule 3 – Punctuation.  Use an X for each period in your plaintext. For example, MESSAGE RECEIVEDX SEND MORE INFOX. All other punctuation must be written out in full. For example, COMMA.
     Rule 4 – Termination.  End your plaintext with XX. If necessary, add dummy characters after XX in order to pad out the message to frustrate cryptanalysis and to conclude on a doublet (ensuring the numeric string ends with four digits).


Use a pointer
at the beginning
of your message
to specify the
key so your
recipient can
decrypt the text.

Step 3:  Encrypt your message...
     We need some way to indicate to our recipient where the key begins, otherwise he/she won't be able to decrypt.
     Remember in our earlier example, we created a key and stroked off (in gray) the blocks we'd already used. Here's what our key looked like.
     0812 1319 0526 1802 0816 1910 1520 0423
     The starting position in the key is at block 1319. So we'll place the string 1319 at the beginning of our message so the recipient will know how to decrypt. The plaintext message of 1325 1905 0318 0520 becomes 1319 1325 1905 0318 0529 because we place the pointer 1319 at the beginning of the string.
     We're now ready to encrypyt. First we write out the plaintext. Then directly below it we write out the key. Then we add the key to the plaintext using Fibonicci addition. This means we do no carrying. For example, 9 + 2 would yield 1 not 11. And 7 plus 6 would yield 3 not 13. Here's how the spy's working sheet would look.

Plaintext 1319 1325 1905 0318 0520
Key -- 0526 1802 0816 1910
Ciphertext 1319 1841 2707 0124 1430

     The encrypted message 1319 1841 2707 0124 1430 is ready to be sent to our recipient. And we can sleep peacefully knowing that it cannot be cracked by anyone except the recipient.


To decrypt the
message, the
recipient simply
reverses the
calculations.

Decrypting the message...
     To decrypt a message, we simply reverse the calculations. We subtract the key from the ciphertext using Fibonicci subtraction. This means we allow no negative numbers. We add 10 if required. For example, 2 - 9 would yield 3 (because we add 10 so that we're able to subtract 9 from 12).
     The first block in the ciphertext tells our recipient where to start in the key.
     Here's what the recipient's working sheet looks like.

Ciphertext 1319 1841 2707 0124 1430
Key 1319 0526 1802 0816 1910
Plaintext -- 1325 1905 0318 0520

Here's how we subtract 0526 from 1841.
     The first column is 1 - 0 = 1.
     The second column is 8 - 5 = 3.
     The third column is 4 - 2 = 2.
     The fourth column is 1 - 6 = 5 (because 11 - 6 = 5).
Using the conversion chart described earlier, the recipient converts the string of numbers back into alphabet characters. In this example, 13=M and 25=Y, so the first block 1325 converts to MY. The string 1325 1905 0318 0520 becomes MY SE CR ET.
     The recipient reformats it to become MY SECRET.


...

Logo

About security...
     Provided that an eavesdropper cannot get access to either the sender's or receiver's key, the one-time pad method is 100% secure. No FBI cryptanalyst will ever crack it. No Cray supercomputer running the NSA's cracker software will ever break it.  Period.
     But you need to be prudent about security.
     Key security.  Good security means you must conceal your key in a location where you'll know if it's been tampered with. Usually this means carrying it on your person at all times.
     Location security.  Good security means choosing private locations to encrypt and decrypt your messages. Remember, it's easy for FBI agents or local police to install a pinhole video camera above your desk. When choosing a location, be creative, be unpredictable, and be quick.
SURVIVAL TIP – At the first sign of surveillance you must stop working at your desk unless you're absolutely sure there's no way they can gain access to install the video surveillance equipment. In a pinch you can work under your desk until you implement off-site locations.
     Disposal security.  Good security means destroying your working materials after each encryption or decryption. Don't leave anything around for the authorities to work with. This usually means shredding and burning – or ingestion. (Yes, eat the evidence. It saved Kim Philby's bacon early in his career.)
     Random means just that.  The security of your one-time pad system depends on the randomness of the key. Don't use a computer to generate your keys. Do it by hand – and be sure to introduce a second element of randomness into your method by throwing dice or flipping a coin every now and then while you're creating your keys.
     One-time means just that.  Don't use a key more than once. Ever. Even if just a few blocks overlap in two different messages, the NSA cracker software will shift and compare the ciphertext messages until the statistical frequency of characters matches the expected statistics for English language text. Giving the NSA an opening like this is tantamount to setting the fox loose in the hen-house.
     The perfect system.  When used correctly, the one-time pad system provides perfect security for your secret messages. The weakest link is the human element.

The first four-digit
group is a pointer
to the starting place
in the one-time pad.


How to test your skills...
     Here is a piece of ciphertext and a one-time pad you can use to verify your new skills.
     The one-time pad is 0916 0305 2521 2113 0119 0605 1413 2024 0806 0518 1306 0602 1710 2022 0410 0804 2301 2116 1512.
     The ciphertext is 0119 2110 3521 2739 2026 0113 1414 1527 2231.
     Remember that the first four-digit group in the ciphertext is a pointer indicating where to begin in the one-time pad.


...

Spy & CounterSpy

Spy school for the rest of us.


Back to Home Page

Here is the small print.  It appears here because we have found that maintaining a corporate front is the only way we can protect ourselves against interference by governments and their agencies.  The legal underpinnings of our corporate front are our first line of defense against audit-attacks and other methods of economic warfare that the authorities use to suppress dissent, protest, and activism.  They are also determined to prove their hypothesis that Spy & CounterSpy is funded by a foreign intelligence agency or terrorist group – but our double entry accounting record of corporate revenue and expenses is our shield against fabricated evidence by an overzealous investigator or case officer.
Contents Copyright ©1998 Lee Adams.  All rights reserved.  Published by Lee Adams Seminars.  Provided for entertainment and information purposes only.  Spy & CounterSpy and Spy school for the rest of us and How To Make People Say Yes! are trade-marks in USA, Canada, and/or other countries.  Lee Adams Seminars is a division of Here's-how, Right-now! Seminars Inc.
OFFICE:  3273 Tennyson Avenue, Victoria, British Columbia, Canada.
MAIL:  PO Box 8026, Victoria BC, CANADA V8W 3R7.
TELEPHONE:  (250) 475-1450.
FAX:  (250) 475-1460.
EMAIL: reader_service@SPYCOUNTERSPY.com