A Speech On One Time Pad

2731 Words11 Pages
One Time Pad Sri Hari Uppalapati Murray State University Presentation Peer Reviews 4,3,4,5,4,3 4, 4, 4, 4, 3, 4 4, 4, 5, 4, 5, 5 Well-explained on your slides. I had never heard of OTP, but I found it quite interesting! 4,4,3,4,5,4 4,4,3,2,3,4 4,3,3,3,4,4 4,3,4,4,4,3 4, 4, 4, 4, 3, 4 3,4,4,5,4,4 4, 3, 3, 4, 4, 5 4, 3, 4, 4, 4, 4 3, 3, 4, 4, 4, 4 3, 3, 2, 3, 4, 3. Explanations are good. But could have been much better 3,2,4,3,4,4 5, 5, 5, 5, 5, 5 – Awesome presentation Sri Hari. I think you gave the best presentation out of all. You explained the topic clearly 4, 4, 3, 5, 4, 4 3, 4, 4, 3, 3,…show more content…
The hackers have the option of using many techniques, like shoulder surfing, snooping, sniffing, guessing etc. These are to hack the data and manipulate it. The one time pad is a truly random collection of letters which are used to encrypt the messages with complete security and it is also called a perfect security. It is called a perfect security because it is impossible to recover the message without knowing the key. Prefect security is equal to the key length, which the key length is greater than or equal to the message length. The random key length much to plain text .One time pad encryption is only possible if both sender and receiver are in possession of the same key. The cipher text will be completely random because it is generated by doing Exclusive or Operation (XOR) operation with plain text and the random key. The plain text (message) can also be represented in binary string format. Mechanism of One Time Pad (1) The binary version of one-time pad The message can be converted into binary string by using a coding mechanism such as ASCII coding which is a sequence of 0’s and 1’s. The truly random key should be generated with a sequence of 0’s and 1’s of the same length as the message. Plaintext length = Cipher text length = key length = {0, 1} For example: Plain text 1101 1011 Random
Open Document