Starglider wrote:Starglider wrote:You prefix every transmission with an index into the one-time pad.
Missing a transmission has no effect.
Well gosh, I guess you're right. No effect at all. Unless you use the "please resend transmission" code to, oh, I don't know, break the cipher. How? "Resend transmission sent X time using index Y." "Resend transmission sent time Z using index Y." I will conceed that I missed that part of your previous posts and that it would solve the good old "where were we" problem on the face of it. Unless, of course, the prefix was corrupted in any way. In which case you're still fucked for that message. Remember that reusing the same place in the key IS A BAD IDEA. The Russians made that mistake once and ended up paying for it in the Cold War.
Which you can and would do here. For encryption purposes each part of the pad acts like a new key, but for management purposes you're continuing to use the same key until it expires.
That's fair, though you certainly did not make that clear in your initial posts. You still haven't dealt with the transmission problem, however.
No, the one time pad needs to be equal longer than all the messages you want to send with it combined. Your mental model is broken twice. In practice you generate a petabyte or so of random bits from atomic decay, hand one copy to each node in a link and mark it as 'expires in 3 months'. As long as neither node is compromised (which will break any system) and they don't need to send more than a petabyte, communication will be perfectly secure. If you like you can implement a bidirectional connection by having one pad and each node start using it from a different end.
Wow, way to pick nits. Nice backpedalling from "give out lots of keys", by the by. Yes, a massively long key will work, but you still have key transmission problems. Add to that you're sending out a ridiculous number of keys to a silly number of nodes, what, every three months now? Jesus, even if it was once a year, you're talking about a massive HUMINT security risk. Yes, compromising a node will break any system, but with your magical little system it's much harder to FIX, and the act of fixing it is itself another security risk. THIS IS THE PROBLEM WITH ONE TIME PADS. You have such a hard on for the fact that they're mathematically impossible to break that you've completely ignored the human element.
No, you can shut the fuck up as you are spouting nonsense and clearly haven't built any kind of large scale, in-production encrypted comms system at all, whereas I have.
Fantastic, good for you. Where's your magic one time pad system? Whatever else you've done doesn't mean shit here, pal, because this discussion isn't about whatever else you've done. By the way, did you, you know, build the entire thing? Like, by yourself? Did you? Or were you one of several specialist on a project who focused on his own specific task?
This is quite pathetically ironic.
Blah blah blah. Look, I can make useless one line posts too. Your transmission system is fundamentally flawed.
They are not practical or worth it for point-to-point civillian communications. They work fine for up to thousands of nodes, given large capacity compact storage devices that can be securely distributed, or a completely secure backbone network.
Securely distributed is perhaps the most glaring problem you have. You are describing a system in which the codes have to be physically transported from a central location to thousands of other points across interstellar space. Thousands, if not tens or hundreds of thousands of people are involved in this process.
Again with the blatantly wrong and tragically ironic. You either genuinely have no clue what you're talking about, or your mental model of how the technique is being applied is completely out of sync with all of the above descriptions and general common sense.
Oh, so you're saying that if you find out, two days after your latest code update that you've got a tapped line, that you DON'T need to send out thousands of ships to update the keys?
Because everything described says you DO.
You simply advance to the next key in the schedule. It is true that you can't locally generate and start using new OTPs, but if the situation is that bad you can simply revert to a less demanding cryptosystem. Yes, not having the ability to do this would be stupid, but no military ship is going to have that problem.
So...if the network is tapped...you just move to the next key in the system...from a set of keys that has been compromised? Or are you actually talking about sending out thousands of ships to fix the compromised node and then insert new keys?
By the way, I love how all of this is somehow some trivial thing, as though mobilizing thousands of starships to do maintenance on your comm network is this just massively trivial thing.
Thousands. I expressly noted that the system is impractical to implement to maximum single-node-compromise tolerance past about 1000s of nodes. You ignored that along with just about everything else.
I'm saying that even with thousands of nodes, it's impractical. What, are you going to call in your fucking fleets every time one node might be compromised? Or do you have a massive civilian fleet that mobilizes when you do this? If you have passable regular encryption, why waste massive amounts of money on this system?
Keys need to be regularly supplied in advance, every few months should be adequate. When this isn't possible, that node can use a more space-efficient algorithm.
That doesn't answer the fucking question. HOW DO YOU DISTRIBUTE THE MOTHERFUCKING KEYS?
Which you wouldn't, because it's pointless, /unless/ you have a physically unbreakable channel to do so (for example a quantum encrypted fibre link in the real world - there may or may not be FTL equivalents in a given sci-fi universe). But if you can't get a briefcase securely from your fleet headquarters to your ships you have more serious problems.
No, a single fucking briefcase does not magically refresh thousands of nodes, most of which are in deep fucking space acting as god damned relays. Try again.
Which is exactly what you do with a symmetric system, OTP or otherwise. The only operational advantage of asymmetric encryption is that if the node's entire key schedule is compromised, then the node is recovered and sanitised, secure communications can resume without needing a new key supply - but of course this will exist as a backup mode in any milspec secure comms system, so is irrelevant as a reason not to use OTPs in critical applications.
The difference here is this:
In an open key system, a satellite, one, can be looked at and fixed, the private key generated on the satellite and the public key sent back to the network. Now everything's hunky-dory again. One crew, one fix, no big deal.
Meanwhile, in order to fix YOUR system, you have to send out THOUSANDS of individual updates that have to be physically brought to each node, a process that has to happen with incredible efficiency in order to keep the network downtime from getting out of control.