HOUSE_OVERSIGHT_015906.jpg

1.53 MB

Extraction Summary

1
People
2
Organizations
2
Locations
2
Events
1
Relationships
3
Quotes

Document Information

Type: Book excerpt / investigative document
File Size: 1.53 MB
Summary

This document appears to be page 216 from a book titled 'Are the Androids Dreaming Yet?', included in a House Oversight Committee document production (Bates stamped HOUSE_OVERSIGHT_015906). The text is an educational explanation of cryptography, specifically describing the mechanics, security, and historical context (referencing Claude Shannon and Bell Corp) of the 'one-time pad' encryption method. While the document is part of an investigation file, the content itself is theoretical and instructional regarding secure communications.

People (1)

Name Role Context
Claude Shannon Mathematician/Cryptographer
Proved the security of the one-time pad method while working for Bell Corporation.

Organizations (2)

Name Type Context
Bell Corporation
Employer of Claude Shannon during World War II.
House Oversight Committee
Indicated by the Bates stamp 'HOUSE_OVERSIGHT_015906' at the bottom of the page.

Timeline (2 events)

1945
Claude Shannon proves the one-time pad is perfectly secure.
Bell Corporation
1948
Publication of Claude Shannon's proof regarding one-time pads (delayed due to wartime secrecy).
N/A

Locations (2)

Location Context
Used as a hypothetical location in an example about message length security.
Used as a hypothetical bombing target ('Bomb Bath') in an example.

Relationships (1)

Claude Shannon Employment Bell Corporation
Claude Shannon proved this in 1945 while working for Bell Corporation

Key Quotes (3)

"One perfect way to encode a message is to use a one-time pad."
Source
HOUSE_OVERSIGHT_015906.jpg
Quote #1
"This code is unbreakable – almost!"
Source
HOUSE_OVERSIGHT_015906.jpg
Quote #2
"Claude Shannon proved this in 1945 while working for Bell Corporation but, due to wartime secrecy, his proof was not published until 1948."
Source
HOUSE_OVERSIGHT_015906.jpg
Quote #3

Full Extracted Text

Complete text extracted from the document (2,339 characters)

216 Are the Androids Dreaming Yet?
One perfect way to encode a message is to use a one-time pad. On a sheet of paper I write a completely random set of numbers or letters – since we are going to translate numbers to letters it does not matter which. I make a copy and give it to a person I later want to send a coded message. Because I will only use these two paired sheets once it helps to make a few of them – a pad in fact. By convention, we refer to a single sheet or a whole book as a one-time pad code. Here is the one-time pad I created earlier. It is just a random sequence of letters and spaces.
kaleygnqaloiuebldlan dlkawoqyevbax gmlsosuebal
To code a message, I substitute numbers for letters as with the progressive cypher earlier again using modulo arithmetic to wrap around if I reach the letter ‘z’. I have applied my one-time pad to the hello reader message below to get ‘sfacngfvbpta’.
hello reader
sfacngfvbpta
This code is unbreakable – almost! Notice there are very few clues for anyone wanting to decode it without holding a copy of the pad. Spaces do not necessarily indicate breaks between words, and letter patterns are absent. It has only one flaw. The total number of characters and spaces could have some meaning. This is a problem because if I routinely communicated bombing targets and my message was “Bomb Bath”. You could figure out the sender was not going to bomb Bristol if the message were shorter than 11 letters and spaces. To avoid this problem, messages are extended with nonsense at beginning and end to make sure no information can be gleaned from the length. The convention is to code messages to the full length of the pad. You must never reuse a pad. Each time you code a message, rip off that page rather like a calendar. Destroy it and use the next page for the next message. At the other end, the recipient uses his copy of the pad to run the process in reverse. Decode the message by swapping each letter according to the modulo method, rip the page from the pad, and burn it. Because each key is only used once you can’t use any sort of statistical method to work out the message, making the one-time pad perfectly secure. Claude Shannon proved this in 1945 while working for Bell Corporation but, due to wartime secrecy, his proof was not published until 1948.
HOUSE_OVERSIGHT_015906

Discussion 0

Sign in to join the discussion

No comments yet

Be the first to share your thoughts on this epstein document