4.3 Multiple Use of a One-Time Pad

Alice sends messages to Bob, Carla, and Dante. She encrypts each message with a one-time pad, but she’s lazy and uses the same key for each message. In this section, we’ll show how Eve can decrypt all three messages.

Suppose the messages are M1, M2, M3 and the key is K. The ciphertexts C1, C2, C3 are computed as MiK=Ci. Eve computes

C1C2=(M1K)(M2K)=M1M2.

Similarly, she obtains M1M3=C1C3 and M2M3=C2C3. The key K has disappeared, and Eve’s task is to deduce M1, M2, M3 from knowledge of M1M2, M1M3, M2M3. The following example shows some basic ideas of the method.

Let’s assume for simplicity that the messages are written in capital letters with spaces but with no other punctuation. The letters are converted ...

Get Introduction to Cryptography with Coding Theory, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.