1994-06-28 - “military” one-time-pad generation

Header Data

From: fasttech!zeke@uu4.psi.com (Bohdan Tashchuk)
To: toad.com!cypherpunks@uu4.psi.com
Message Hash: 032f7f1d5b66d4a77b759328327d39a4b674df761823fe172b76dcc6ec9ad2de
Message ID: <9406280416.AA24558@fasttech>
Reply To: N/A
UTC Datetime: 1994-06-28 04:19:25 UTC
Raw Date: Mon, 27 Jun 94 21:19:25 PDT

Raw message

From: fasttech!zeke@uu4.psi.com (Bohdan Tashchuk)
Date: Mon, 27 Jun 94 21:19:25 PDT
To: toad.com!cypherpunks@uu4.psi.com
Subject: "military" one-time-pad generation
Message-ID: <9406280416.AA24558@fasttech>
MIME-Version: 1.0
Content-Type: text/plain


While we're on the topic of random numbers, etc., this is what I was told
a long time ago about military OTPs. I don't know if this OTP generation
was by NSA or by one of the military forces itself. And, as this information
is at least 10 years old, who knows if this is how it's still done. And maybe
it was disinformation, and never done this way.

Anyway, there was supposedly a heavily shielded room which had equipment
that used radioactive decay to generate random numbers. Apparently it was
pretty automated and the thing basically spit out pairs of paper OTP pads
that were already prewrapped in tamperproof packaging.

To me, this makes more sense than Clancy's "atmospheric noise" hypothesis.
But then, Clancy was generating entire CD's worth of bits, which would
certainly need orders of magnitude more bits than actual paper pads.






Thread