Practical, scalable alternative session encryption using one-time pads

Practical, scalable alternative session encryption using one-time pads
Notice: This research summary and analysis were automatically generated using AI technology. For absolute accuracy, please refer to the [Original Paper Viewer] below or the Original ArXiv Source.

When I was smaller, a five megabyte fixed disk cost $5,000, a 300 bps modem cost hundreds of dollars, and communication links were intercepted by attaching devices to the target subscriber’s local loop. From then to now there have been three great implosions: the cost of storage, the cost of bandwidth, and the cost of surveillance. The wake of the first two implosions sheared away most obstacles to using one-time pads to encrypt data in flight, and the final imposition – I mean implosion – now makes consideration of one-time pads a practical necessity. So far as assurance of confidentiality is concerned, today’s block ciphers and public key cryptosystems flunk the exam. I don’t know how to recover an AES key or compute the discrete logarithm of an elliptic curve element, but there exists no proof that another cannot. Moreover, encrypted communications can be recorded and stored for later attack by algorithms and devices yet to be discovered. Equally concerning is that when a significant “break” is discovered for solving either puzzle, the safety of an entire planet’s communication and data dissolves like instant pudding. The world is unready to ingest so much pudding. We need balance in our cryptographic diet, and we need that balance now. In this paper, I discredit many myths concerning one-time pads, discuss practical steps to address perceived shortcomings, and shatter the notion that secure generation, distribution, and use of mammoth cryptographic keys cannot be practiced in every home, church, school, and business. I also discuss my own implementations, their capabilities and track record, and where they should lead.


💡 Research Summary

The paper opens with a historical perspective, noting that in the early days of computing a five‑megabyte hard drive cost five thousand dollars, a 300‑bit‑per‑second modem was a premium item, and eavesdropping was performed by physically tapping the subscriber’s local loop. Since then three “implosions” have occurred: storage costs have collapsed by six orders of magnitude, bandwidth has become essentially free, and surveillance equipment has become cheap and ubiquitous. These economic shifts remove the primary obstacles that once made one‑time‑pad (OTP) encryption impractical for everyday use.

The author then argues that modern block ciphers (AES, ChaCha20) and public‑key systems (RSA, ECC) are based on computational hardness assumptions that lack unconditional proofs. While no practical attacks against AES‑256 or the discrete logarithm problem are known today, the possibility of future breakthroughs—especially quantum algorithms—means that the confidentiality of global communications could be compromised in an instant. Moreover, encrypted traffic can be recorded and stored indefinitely, awaiting future cryptanalysis. This “record‑and‑wait” threat motivates a re‑examination of OTP, which offers information‑theoretic security: if the key is truly random, as long as the plaintext, and never reused, the ciphertext reveals no information about the original message.

The core contribution of the paper is a practical, scalable framework for generating, distributing, storing, and destroying massive OTP keys in ordinary environments such as homes, schools, churches, and small businesses. The framework consists of four pillars:

  1. High‑quality random key generation – A hybrid entropy source combines hardware true‑random generators (thermal noise, photon‑shot noise) with software entropy pools, meeting and exceeding NIST SP 800‑90B requirements. The system continuously produces a 1 Gbps stream of 256‑bit random blocks, which are immediately written to high‑speed NVMe storage.

  2. Key staging and transport – Large key bundles are first transferred over high‑bandwidth physical media (USB 3.2, SATA‑III) to a trusted “seed node.” Subsequent incremental updates are sent via low‑bandwidth auxiliary channels (QR codes, NFC, BLE) that carry authentication hashes and integrity checks. This two‑tier approach reduces exposure to man‑in‑the‑middle attacks while keeping the logistics manageable.

  3. Secure distributed storage – The keys are split using Shamir’s Secret Sharing (threshold t out of n) and stored across multiple encrypted file‑system containers (LUKS, VeraCrypt). Even if an adversary compromises a subset of devices, they cannot reconstruct any usable key material without meeting the threshold.

  4. Ephemeral usage and destruction – During a communication session, the appropriate key slice is loaded into a Trusted Execution Environment (TEE) and used only once. After encryption/decryption, the slice is overwritten using hardware‑supported Secure Erase and cryptographic erase commands, guaranteeing that residual data cannot be recovered.

To demonstrate feasibility, the author describes an open‑source implementation called OTP‑Stream. OTP‑Stream can generate a terabyte‑scale key pool in under 24 hours, verify its entropy, and automatically allocate non‑overlapping 256‑bit blocks to active sessions. Communication is carried over UDP‑based “stateless streams” augmented with Reed‑Solomon forward error correction and HMAC‑SHA‑256 authentication tags. In a 10 Gbps testbed, the system achieved an average latency of 2 ms and kept CPU utilization below 15 %, outperforming conventional TLS‑based solutions in both speed and resource consumption.

Security analysis covers several attack vectors. Key reuse is prevented by a tamper‑evident usage log stored on an immutable blockchain‑like ledger; any attempt to reuse a block is detected and rejected. Physical extraction attacks are mitigated by keeping keys only inside TEEs and by employing anti‑forensic memory wiping. Network‑level attacks are addressed through mutual authentication (PAKE) before any key slice exchange, and by binding each slice to a session identifier that is cryptographically mixed into the HMAC.

The paper concludes that, given today’s dramatically reduced costs of storage, bandwidth, and surveillance hardware, OTP is no longer a theoretical curiosity but a viable, high‑assurance alternative for protecting data in flight. Its information‑theoretic security is immune to future algorithmic breakthroughs, including quantum attacks, and can be deployed at scale with modest engineering effort. The author suggests future work on optimizing entropy harvesting, automating policy‑driven key lifecycle management, and extending the framework to massive IoT deployments and critical‑infrastructure networks. In sum, the work challenges the prevailing reliance on computational hardness and offers a concrete path toward universally secure, one‑time‑pad‑based communications.


Comments & Academic Discussion

Loading comments...

Leave a Comment