Subscribe Now Subscribe Today
Science Alert
Curve Top
Information Technology Journal
  Year: 2005 | Volume: 4 | Issue: 1 | Page No.: 87-95
DOI: 10.3923/itj.2005.87.95
Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Implementation of One-Time Pad Cryptography

K.V.O. Rabah

In this study we show how a moderate amount of random key stream can be used to generate a lifetime supply of keys for one-time pads. We also show how arbitrarily many parties can correspond using the same random key, without compromising one another's communications. The net effect is to make the unbreakable one-time pad practical for widespread use. Provided also is the practical information that you can use to set up your own one-time pad encryption system. The study further describes subtle refinements that you won’t find in other books or articles.
PDF Fulltext XML References Citation Report Citation
How to cite this article:

K.V.O. Rabah , 2005. Implementation of One-Time Pad Cryptography. Information Technology Journal, 4: 87-95.

DOI: 10.3923/itj.2005.87.95






Curve Bottom