To better
understand how PKE works, consider the following analogy. The King
of France sends a secret message to the Crown Prince of Poland,
suggesting that they form an alliance to attack their common enemy,
Prussia. Because the king’s courier must pass through Prussian
territory several times to deliver the message, it
is critical that the message remains securely sealed during its
travels.
The king
sends his message in his diplomatic lock box (Figure 2). It is
secured with the king’s personal padlock. Only he has the key to
open the lock.
The Crown
Prince receives the box, but he cannot open it. Instead, the prince
places his own personal padlock on the box and sends it back to the
king.
The king
receives the box, which now has two locks. The king removes his
lock and sends the box back to the prince.
The
prince again receives the box. This time he can open it because it
is secured only with his personal padlock. He reads the message and
considers the king’s proposal.
The
king’s message is secure. The drawback is that it may take several
weeks to complete the transmission of his message. PKE uses a
similar technique that is particularly suited to Internet email
communication, which allows the quick exchange of messages. PKE
uses the following steps:
John
generates an OTP message enciphered with his random
PK.
The
message is the equivalent of a lockbox with John's personal
padlock.
John sends it (by email) to
Karen.
Email is
the equivalent of the King's courier.
Sending a message through cyberspace (the Internet) is the
equivalent of the courier passing through enemy
territory.
John keeps his PK for future
use.
Karen cannot decipher John’s message. Instead she enciphers it a
second time with her own PK. She emails the message back to John
and keeps her PK for future
use.
Karen's
PK is the equivalent of placing her own padlock on the
lockbox.
Karen sends the email back to
John.
When John receives the double-encrypted (two padlocks) message from
Karen he partly deciphers the message with his PK then emails it
back to
Karen.
When John
partly decrypts the message with his PK it is the equivalent of
removing his padlock from the
box
The message is still securely enciphered with Karen’s
PK.
At this point John destroys his
PK.
When Karen receives the message from John she deciphers it using
her PK. This reveals John’s plaintext message.
Karen's
decryption is the equivalent of removing her padlock, which allows
her to open the box.
Karen now destroys her PK.
VII.
One-Time Pad
Software
A free
and easy-to-use OTP program can be downloaded from this
website:
You can
use this program to replicate the examples shown below and also to
exchange short OTP messages with PKE encryption.
VIII.
An Example Using PKE
Encryption
John
wants to send the following secret message to
Karen:
Meet me
at eight pm on the footbridge in the city park stop be sure to
check our signal site stop I will leave a coin there if I am being
tailed stop If you see the coin leave the park immediately and wait
for further instructions stop end xxxx
Message 1: John's plaintext message for Karen
John uses the OTP software. It creates a random PK for his message
and performs the mod-26 encryption. John’s OTP message is
illustrated in Figure 3.

Figure 3:
John’s OTP/PKE message to Karen
Notes:
This
message has 191 characters, not counting spaces.
John pads the message with four extra characters (XXXX) so that the
character count is evenly divisible by five.
The
message does not use numbers or punctuation.
John
sends his ciphertext message to
Karen:
YDQFCAFCGLSUPWHTEEIDSKSCJSIZFWVXFJXRSRVIOPZITUEAML
FMYGGMRFGKFXFDENSLVEOBVTSWJABUMJUNGRQXLISSEXRQGOSG
PINVCVLHBEFIMOFELKWJBUARIHVRPIQRGMRBNFHPHCFBWSWUOX
LFNYOYGGRPXKMSQJVHOODPZDIFTQXDGDLHZWNDGEPQPQZ
Message
2: John's ciphertext message for Karen
John
saves his PK (personal key)for future
use.
LYLLPVEIBCLMVGUEQKAYMVDIHAZVYRMJLBSOJXWSNXOPZFOYHSK
UTMRJJADZQCNKVGEKJLFHQAYHTRELAXIIFVLWITJEKPMYBFMXOV
LQTHENAVTDIVLPVBQKMZHMDNNMMTHDUHQFILZKRBNQNFJPKOKLI
MPXSCUOOQGDYDAPUGYXQPPLBVUJXOXOGCYNBQLSRSBYAPRIMOUC
VSDBIMJYGIGGPOZIBKRLFRIOVAUXWCEADSIBTZTJHERCVQIIRSP
IPJSBIQOWIRSQMWHZSBPRZJHP
Message
3: John's PK
Karen
cannot decipher this message. Instead she enciphers it a second
time with her own PK. She sends the double-enciphered message back
to John (Figure 4).

Figure 4:
Karen returns the message to John with her PK
encryption
Karen’s
enciphered message to
John:
SYQEIWHPUZWTCXJHGRMDHXOCBATMDLWORMELSVHWNHQYTZWICS
SEFLXIZCNQYTEWWKBVJMBWTDMOTXAILIHGLBWORGTEPSSFFLQC
KYXRZGPOQPDEZVZHRUOKWYLWEAHJFHFWXVXGSTSZUEASMTWSYI
RRZIOJFEAFZGNERDBPWDKQAGBUNQTHTYLTPGAJXVMNJZX
Message
4: Karen's return ciphertext message for John
Karen
saves her PK (below):
TUZYFVBMNNDYMABNBMDZOMVZRHKMXOAQLCGTZDLNYRQPZERHPG
MRGEQVHWGFSVYSRWIJNHMUXJTRJWYNYYMSEJFQFXALKUAOYWXV
UPJVWKDGOKXVMGTCFJRAUDKEVSLRPYOEQIFEENKJMBUQPAZXJK
FLLJZKYXIPBVALATFHHOGAACSOTZVDMUZLPJMFQQWWTIXQVENU
OHIFBVWBIYYULUCOQZOPUFEZBFXUYVGEMLGBNNKSSSZZFSUIZX
VPIWLOJGQZIBQZJVTNJMLBIZORRUDH
Message
5: Karen's PK
John
partly deciphers the message using his PK then sends it back to
Karen.

Figure 5:
John partly-deciphers the message with his PK
Karen
further deciphers this message using her PK. She can now read
John’s original message.

Figure 6:
Karen deciphers John’s message with her PK
IX.
Things to Think
About
Enemy
agents may intercept John’s original ciphertext, Karen’s response
ciphertext and John’s partly-deciphered text message. The private
keys (PKs) used to encipher these messages, however, are never
transmitted and so none of these messages, if intercepted, can be
deciphered.
At first
glance, one might think that John is reusing his PK - a violation
of OTP security protocol. Actually John is simply removing his PK
(padlock)from the double-encrypted message. This is not the same as
enciphering a new message with the same PK. Removing his PK does
not threaten the security of the message.
X.
Laboratory
Assignment
You
receive the following email message from your fellow agent, Know
Future:
WIGPGLRPVQPLFXGNHLWG
UOVKQGABQQKLTIZMDJNR
JRNBSLTXZDLQZXERZKAA
KSXMDDDYTOZNBOWSKQVI
YINUWTXAJFFRVPWJCPSG
PKMQVYAWSGPCDTKMNNRN
MVGJWJKLRYZCXKONHRAC
UGPOXPGTMCZVXUEEQUCQ
CBIWXBMBAQVFWHGLYGJL
SD
Message 6:
PK-encrypted
message from Know Future
It is an OTP ciphertext encrypted with Know Future’s PK. You save
his ciphertext then encipher it a second time with your own PK. Use
the following as your PK:
AQCEIMOHRQOTCJULMIBM
XLPCMVIKEVIZEIUACPAK
YCTRWNXBNJD
GKLDDPSVP
TRADFMEZPTQGHJRQSRKW
EWGFPPKDCVWJWECGPZYE
SF
PIFGAROBJMWOBKKEPQ
HZCSLOTXRNRPKGBDCOJW
IZAIZEEVSMWER
WGSJCEP
XYCHPEEHIBKEXSMZYPHN
LVJGPJXJOCLWRAVGCFCF
IMVR
EOXZCNBNNLGMNFSS
XVUGJNOOXSZOMRHJCTLV
YTDWUPRHUFKUJOJ
GLFXF
WXZTFKJIOP
Message
7:
Your PK.
Use it to encrypt Message 6
You email this double-encrypted message back to Know Future.
Moments later you receive the following response:
HFWTUNIBZITYVSSPRPVJ
MEUYRJYEJEPHYBDYWXSP
DPCFKCPVVVSUPUKLJLEN
XWHXNEJEDCELXDKZQRPO
TBPMXJXMQSBCQXWVFLNT
DLEAHSBUZDSFLCVFMJYE
BHHEMHNNABWJCLGWWDZF
PNPAEYMAVRAFJQYXOVWU
EZULIPSWFHFYSKRSSEXS
ZZ
Message
8: Decrypt this message using your PK
Decipher
this message using your PK and the OTP software then follow Know
Future’s
instructions.