This is no different from other encryption methods; if you know nothing about the contents of encrypted data then you have no way of knowing if what you've decrypted is usable. As I said earlier, if you are encrypting a file-system, then unless the attacker knows this then it becomes difficult for them to know when they've actually found the correct key anyway. You can sort of work around that with statistical analysis but it's the same basic problem; if someone hands you a lump of encrypted data and asks you to decrypt it with no information as to what it is, or how it was encoded, then
that's a far more "unbreakable" case than anything else described, as you could guess the key on your first attempt but if it doesn't produce anything recognisably decrypted then it's just as secure as ever
You're wrong, again.
Simple maths and probability can tell you that it is easy to to determine whether you have decrypted a message or not. Since the data have encrypted is usually many, many times bigger than the key, it is mathematically highly improbable that any other key from all the possible keys in the key space will render a valid result, e.g. if we have encrypted a harddrive, it is highly improbable that any key different to the key used for encryption will give us a harddrive with a valid file system header. Likewise with text messages, a decrypted message should have a dominance of roman characters, which again is highly improbable for any other key other than our secret key. If you've ever worked with decryption software or ever wrote any brute-force algorithms you would have known that.
However even if we know what was encrypted using OTP, we still wouldn't be able to decrypt it. If we have an encrypted message that has 1000 characters, any message that consists of 1000 characters can be found during our "brute force" process. Do you get it, finally? We are guessing the whole message. Every byte in the original message has a unique byte in the pad that manipulates it. If we don't have the pad, we can't decrypt the message. It's as simple as that. It's impossible to crack OTP. No buts. It's impossible, stop arguing. So:
Likewise with a one-time pad, you don't need to know what the message says, only have some method for determining whether it's been decrypted or is still entirely or partly gibberish. For example, if you're hoping the data contains co-ordinates or credit-card details then you can do pattern matching after each guess to see if you've found anything that looks correct.
is also wrong and just shows you still don't understand how OTP works (
"Indeed, the fact that one-time pads aren't applied in stages is actually a weakness" - what are you talking about? One stage is enough for OTP for it to be unbreakable. "A one-time pad is actually only as strong as the smallest unit of data you can verify" - what, what, what? The smallest unit of data you can verify is the whole freaking piece of data, but the problem is YOU CANNOT VERIFY IT. That's the whole point. You seem to know nothing about what you're talking about.). No pattern-matching bollocks will help you since every single byte needs to be guessed. Get it? Get it? Or do I have to explain it to you once more?
Please just simply learn about OTP before you continue this discussion.
OTP is unbreakable. I gave you facts, I gave you sources, I gave you explanations.
Why are you trying so hard to disprove something that is obvious to every cryptologist? Can't you just admit you're wrong?
----------
I will show you WHY the single use pad is unbreakable by using the simplest possible example.
I will give him an even simpler example.
I am thinking of a single digit number (data that will be encrypted).
I have either added or subtracted a digit from my digit (the pad/key).
My result is 7 (the encrypted message).
What number was I thinking of? Try cracking OTP - it should be fast, the are only 10 keys.
Answer: You cannot tell which number I was thinking of thus you cannot crack OTP! That
is the whole point. Now imagine I do this for every single byte in my encrypted data. The same thing applies - you cannot guess every single byte. You simply can't. It doesn't matter if I think of one number or a million numbers. You can't argue that you can break OTP because that defies logic!