4.3 Multiple Use of a One-Time Pad
Alice sends messages to Bob, Carla, and Dante. She encrypts each message with a one-time pad, but she’s lazy and uses the same key for each message. In this section, we’ll show how Eve can decrypt all three messages.
Suppose the messages are and the key is . The ciphertexts are computed as . Eve computes
Similarly, she obtains and . The key has disappeared, and Eve’s task is to deduce from knowledge of , , . The following example shows some basic ideas of the method.
Let’s assume for simplicity that the messages are written in capital letters with spaces but with no other punctuation. The letters are converted ...
Get Introduction to Cryptography with Coding Theory, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.