A Vernam cipher also called a One Time Pad (OTP), or the perfect cipher, is a cryptographic algorithm where plaintext is combined with a random key. It is the only existing mathematically proven unbreakable form of encryption. First patented by Gilbert Vernam in 1917, with a system that used an electro mechanical punch tape system to encrypt teletype TTY communications; this became the first automated online encryption system. Used by Special Operations teams and resistance groups during WW2, intelligence agencies during the Cold War and beyond, it became an essential cipher for protecting diplomatic and military message traffic around the world for many decades. The One Time Pad has gained a reputation for absolute security which is unmatched by today's modern crypto algorithms. Whatever technological progress may come in the future, One Time Pad encryption is, and will always remain, the only truly unbreakable system that provides real long-term message secrecy.
The prerequisites of an OTP system: •The key is at least as long as the message or data that must be encrypted. •The key is truly random. •Key and plaintext are calculated modulo 2 (binary). •Each key is used only once. •There should only be two copies of the key: one for the sender and one for the receiver.
V-Pad can create a true OTP, by importing random data from a hardware generated device, (which have become affordable and can plug into a USB port or PCI slot). V-Pad keys can never be re-used; an internal position marker within the key file cannot be reset, the key can be set to be deleted by the application when it has time expired or the remaining length is less than a user defined threshold. A single key file can encrypt up to 100GB of data, (commercial version), keys cannot be overlapped. V-Pad uses a binary XOR to combine key and message data. By default two copies of the key are created, an Export copy that can be distributed to the intended recipient of the encrypted messages, and a local copy stored in the applications working directory. V-Pad can also create a form of pseudo OTP, that instead of using true random data, it generates pseudo random using one of the most powerful DRBGs in the world; CSRG, which uses dynamic forward secrecy, and is the equivalent of a 1152 bit encryptor.