Two working decipher keys giving various, valid results for one ciphered message - is it possible?

The name of the pictureThe name of the pictureThe name of the pictureClash Royale CLAN TAG#URR8PPP











up vote
2
down vote

favorite












Let's assume following scenario:



There's a ciphered message. Two decipher keys (let's name them A and B) are known.



Message deciphered with key A gives valid result - normal text but with no secret information. Let it be a poem or other meaningless content.



The same message deciphered with key B gives the right output, the real secret message revealed.



Please tell me, is it possible (or well-known and existing method/algorithm), or just a work of fiction? I've read about it in some novel a long time ago and tried to figure it out on my own, but with no result. But I'm rather ignorant in terms of cryptography so I might just miss something obvious.



Thank you in advance for any help - just a simple name of ciphering method or link to Wikipedia or something will be enough. I don't even dare to ask for the full and detailed explanation.










share|improve this question























  • The one of the simpler examples is one-time pad. Assume you have two texts, $X$ and $Y$. First pick a random key $A$ and compute ciphertext $C = X oplus A$. Then derive key $B$ as $B = C oplus Y$. So, $C oplus B = Y$ and $C oplus A = X$.
    – Carl Löndahl
    Sep 10 at 9:22















up vote
2
down vote

favorite












Let's assume following scenario:



There's a ciphered message. Two decipher keys (let's name them A and B) are known.



Message deciphered with key A gives valid result - normal text but with no secret information. Let it be a poem or other meaningless content.



The same message deciphered with key B gives the right output, the real secret message revealed.



Please tell me, is it possible (or well-known and existing method/algorithm), or just a work of fiction? I've read about it in some novel a long time ago and tried to figure it out on my own, but with no result. But I'm rather ignorant in terms of cryptography so I might just miss something obvious.



Thank you in advance for any help - just a simple name of ciphering method or link to Wikipedia or something will be enough. I don't even dare to ask for the full and detailed explanation.










share|improve this question























  • The one of the simpler examples is one-time pad. Assume you have two texts, $X$ and $Y$. First pick a random key $A$ and compute ciphertext $C = X oplus A$. Then derive key $B$ as $B = C oplus Y$. So, $C oplus B = Y$ and $C oplus A = X$.
    – Carl Löndahl
    Sep 10 at 9:22













up vote
2
down vote

favorite









up vote
2
down vote

favorite











Let's assume following scenario:



There's a ciphered message. Two decipher keys (let's name them A and B) are known.



Message deciphered with key A gives valid result - normal text but with no secret information. Let it be a poem or other meaningless content.



The same message deciphered with key B gives the right output, the real secret message revealed.



Please tell me, is it possible (or well-known and existing method/algorithm), or just a work of fiction? I've read about it in some novel a long time ago and tried to figure it out on my own, but with no result. But I'm rather ignorant in terms of cryptography so I might just miss something obvious.



Thank you in advance for any help - just a simple name of ciphering method or link to Wikipedia or something will be enough. I don't even dare to ask for the full and detailed explanation.










share|improve this question















Let's assume following scenario:



There's a ciphered message. Two decipher keys (let's name them A and B) are known.



Message deciphered with key A gives valid result - normal text but with no secret information. Let it be a poem or other meaningless content.



The same message deciphered with key B gives the right output, the real secret message revealed.



Please tell me, is it possible (or well-known and existing method/algorithm), or just a work of fiction? I've read about it in some novel a long time ago and tried to figure it out on my own, but with no result. But I'm rather ignorant in terms of cryptography so I might just miss something obvious.



Thank you in advance for any help - just a simple name of ciphering method or link to Wikipedia or something will be enough. I don't even dare to ask for the full and detailed explanation.







encryption keys






share|improve this question















share|improve this question













share|improve this question




share|improve this question








edited Sep 11 at 12:25









R1w

539221




539221










asked Sep 10 at 6:37









Bario Malotelli

92




92











  • The one of the simpler examples is one-time pad. Assume you have two texts, $X$ and $Y$. First pick a random key $A$ and compute ciphertext $C = X oplus A$. Then derive key $B$ as $B = C oplus Y$. So, $C oplus B = Y$ and $C oplus A = X$.
    – Carl Löndahl
    Sep 10 at 9:22

















  • The one of the simpler examples is one-time pad. Assume you have two texts, $X$ and $Y$. First pick a random key $A$ and compute ciphertext $C = X oplus A$. Then derive key $B$ as $B = C oplus Y$. So, $C oplus B = Y$ and $C oplus A = X$.
    – Carl Löndahl
    Sep 10 at 9:22
















The one of the simpler examples is one-time pad. Assume you have two texts, $X$ and $Y$. First pick a random key $A$ and compute ciphertext $C = X oplus A$. Then derive key $B$ as $B = C oplus Y$. So, $C oplus B = Y$ and $C oplus A = X$.
– Carl Löndahl
Sep 10 at 9:22





The one of the simpler examples is one-time pad. Assume you have two texts, $X$ and $Y$. First pick a random key $A$ and compute ciphertext $C = X oplus A$. Then derive key $B$ as $B = C oplus Y$. So, $C oplus B = Y$ and $C oplus A = X$.
– Carl Löndahl
Sep 10 at 9:22











2 Answers
2






active

oldest

votes

















up vote
2
down vote













This property can be achieved with a One-time pad.




"In fact, it is possible to "decrypt" out of the ciphertext any message whatsoever with the same number of characters, simply by using a different key, and there is no information in the ciphertext that will allow Eve to choose among the various possible readings of the ciphertext."




This is nicely shown in this example from Wikipedia (section "Attempt at cryptanalysis").






share|improve this answer



























    up vote
    -1
    down vote













    Thank you guys very much for your help and explanations.



    I've started to Google for more info about one-time pad technique and found another suitable solution called Denial Encryption. Well, two of the most interesting content is available here, at crypto.stackexchange.com.... unfortunately I didn't find them before - maybe I didn't specify the proper search query - please don't blame me :)



    Here they are, in case somebody looks for similar problem in future:



    Deniable Encryption (*term corrected according to comment by Gordon Davisson)



    Something similar, that could be helpful too



    Thank you again and have a nice day.



    P.S. I'm fully satisfied with answers received, so this topic could be freely closed/archived - I don't know how to do it on my own.






    share|improve this answer






















    • Correction: it's "deniable encryption". Web searches will work better with the correct spelling :-) And there's a tag for it here on crypto.se: deniable-encryption.
      – Gordon Davisson
      Sep 10 at 11:15











    • Yes, you're right - my fault. Thanks for letting me know, I've corrected the error.
      – Bario Malotelli
      Sep 10 at 11:59










    • Link-only answers are discouraged, as links go dead all the time. Please make the answer self-contained by quoting the relevant parts of the linked resources.
      – fkraiem
      Sep 10 at 12:20










    Your Answer




    StackExchange.ifUsing("editor", function ()
    return StackExchange.using("mathjaxEditing", function ()
    StackExchange.MarkdownEditor.creationCallbacks.add(function (editor, postfix)
    StackExchange.mathjaxEditing.prepareWmdForMathJax(editor, postfix, [["$", "$"], ["\\(","\\)"]]);
    );
    );
    , "mathjax-editing");

    StackExchange.ready(function()
    var channelOptions =
    tags: "".split(" "),
    id: "281"
    ;
    initTagRenderer("".split(" "), "".split(" "), channelOptions);

    StackExchange.using("externalEditor", function()
    // Have to fire editor after snippets, if snippets enabled
    if (StackExchange.settings.snippets.snippetsEnabled)
    StackExchange.using("snippets", function()
    createEditor();
    );

    else
    createEditor();

    );

    function createEditor()
    StackExchange.prepareEditor(
    heartbeatType: 'answer',
    convertImagesToLinks: false,
    noModals: false,
    showLowRepImageUploadWarning: true,
    reputationToPostImages: null,
    bindNavPrevention: true,
    postfix: "",
    noCode: true, onDemand: true,
    discardSelector: ".discard-answer"
    ,immediatelyShowMarkdownHelp:true
    );



    );













     

    draft saved


    draft discarded


















    StackExchange.ready(
    function ()
    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fcrypto.stackexchange.com%2fquestions%2f62222%2ftwo-working-decipher-keys-giving-various-valid-results-for-one-ciphered-message%23new-answer', 'question_page');

    );

    Post as a guest






























    2 Answers
    2






    active

    oldest

    votes








    2 Answers
    2






    active

    oldest

    votes









    active

    oldest

    votes






    active

    oldest

    votes








    up vote
    2
    down vote













    This property can be achieved with a One-time pad.




    "In fact, it is possible to "decrypt" out of the ciphertext any message whatsoever with the same number of characters, simply by using a different key, and there is no information in the ciphertext that will allow Eve to choose among the various possible readings of the ciphertext."




    This is nicely shown in this example from Wikipedia (section "Attempt at cryptanalysis").






    share|improve this answer
























      up vote
      2
      down vote













      This property can be achieved with a One-time pad.




      "In fact, it is possible to "decrypt" out of the ciphertext any message whatsoever with the same number of characters, simply by using a different key, and there is no information in the ciphertext that will allow Eve to choose among the various possible readings of the ciphertext."




      This is nicely shown in this example from Wikipedia (section "Attempt at cryptanalysis").






      share|improve this answer






















        up vote
        2
        down vote










        up vote
        2
        down vote









        This property can be achieved with a One-time pad.




        "In fact, it is possible to "decrypt" out of the ciphertext any message whatsoever with the same number of characters, simply by using a different key, and there is no information in the ciphertext that will allow Eve to choose among the various possible readings of the ciphertext."




        This is nicely shown in this example from Wikipedia (section "Attempt at cryptanalysis").






        share|improve this answer












        This property can be achieved with a One-time pad.




        "In fact, it is possible to "decrypt" out of the ciphertext any message whatsoever with the same number of characters, simply by using a different key, and there is no information in the ciphertext that will allow Eve to choose among the various possible readings of the ciphertext."




        This is nicely shown in this example from Wikipedia (section "Attempt at cryptanalysis").







        share|improve this answer












        share|improve this answer



        share|improve this answer










        answered Sep 10 at 9:49









        Aleksander Rassasse

        779216




        779216




















            up vote
            -1
            down vote













            Thank you guys very much for your help and explanations.



            I've started to Google for more info about one-time pad technique and found another suitable solution called Denial Encryption. Well, two of the most interesting content is available here, at crypto.stackexchange.com.... unfortunately I didn't find them before - maybe I didn't specify the proper search query - please don't blame me :)



            Here they are, in case somebody looks for similar problem in future:



            Deniable Encryption (*term corrected according to comment by Gordon Davisson)



            Something similar, that could be helpful too



            Thank you again and have a nice day.



            P.S. I'm fully satisfied with answers received, so this topic could be freely closed/archived - I don't know how to do it on my own.






            share|improve this answer






















            • Correction: it's "deniable encryption". Web searches will work better with the correct spelling :-) And there's a tag for it here on crypto.se: deniable-encryption.
              – Gordon Davisson
              Sep 10 at 11:15











            • Yes, you're right - my fault. Thanks for letting me know, I've corrected the error.
              – Bario Malotelli
              Sep 10 at 11:59










            • Link-only answers are discouraged, as links go dead all the time. Please make the answer self-contained by quoting the relevant parts of the linked resources.
              – fkraiem
              Sep 10 at 12:20














            up vote
            -1
            down vote













            Thank you guys very much for your help and explanations.



            I've started to Google for more info about one-time pad technique and found another suitable solution called Denial Encryption. Well, two of the most interesting content is available here, at crypto.stackexchange.com.... unfortunately I didn't find them before - maybe I didn't specify the proper search query - please don't blame me :)



            Here they are, in case somebody looks for similar problem in future:



            Deniable Encryption (*term corrected according to comment by Gordon Davisson)



            Something similar, that could be helpful too



            Thank you again and have a nice day.



            P.S. I'm fully satisfied with answers received, so this topic could be freely closed/archived - I don't know how to do it on my own.






            share|improve this answer






















            • Correction: it's "deniable encryption". Web searches will work better with the correct spelling :-) And there's a tag for it here on crypto.se: deniable-encryption.
              – Gordon Davisson
              Sep 10 at 11:15











            • Yes, you're right - my fault. Thanks for letting me know, I've corrected the error.
              – Bario Malotelli
              Sep 10 at 11:59










            • Link-only answers are discouraged, as links go dead all the time. Please make the answer self-contained by quoting the relevant parts of the linked resources.
              – fkraiem
              Sep 10 at 12:20












            up vote
            -1
            down vote










            up vote
            -1
            down vote









            Thank you guys very much for your help and explanations.



            I've started to Google for more info about one-time pad technique and found another suitable solution called Denial Encryption. Well, two of the most interesting content is available here, at crypto.stackexchange.com.... unfortunately I didn't find them before - maybe I didn't specify the proper search query - please don't blame me :)



            Here they are, in case somebody looks for similar problem in future:



            Deniable Encryption (*term corrected according to comment by Gordon Davisson)



            Something similar, that could be helpful too



            Thank you again and have a nice day.



            P.S. I'm fully satisfied with answers received, so this topic could be freely closed/archived - I don't know how to do it on my own.






            share|improve this answer














            Thank you guys very much for your help and explanations.



            I've started to Google for more info about one-time pad technique and found another suitable solution called Denial Encryption. Well, two of the most interesting content is available here, at crypto.stackexchange.com.... unfortunately I didn't find them before - maybe I didn't specify the proper search query - please don't blame me :)



            Here they are, in case somebody looks for similar problem in future:



            Deniable Encryption (*term corrected according to comment by Gordon Davisson)



            Something similar, that could be helpful too



            Thank you again and have a nice day.



            P.S. I'm fully satisfied with answers received, so this topic could be freely closed/archived - I don't know how to do it on my own.







            share|improve this answer














            share|improve this answer



            share|improve this answer








            edited Sep 10 at 11:58

























            answered Sep 10 at 10:06









            Bario Malotelli

            92




            92











            • Correction: it's "deniable encryption". Web searches will work better with the correct spelling :-) And there's a tag for it here on crypto.se: deniable-encryption.
              – Gordon Davisson
              Sep 10 at 11:15











            • Yes, you're right - my fault. Thanks for letting me know, I've corrected the error.
              – Bario Malotelli
              Sep 10 at 11:59










            • Link-only answers are discouraged, as links go dead all the time. Please make the answer self-contained by quoting the relevant parts of the linked resources.
              – fkraiem
              Sep 10 at 12:20
















            • Correction: it's "deniable encryption". Web searches will work better with the correct spelling :-) And there's a tag for it here on crypto.se: deniable-encryption.
              – Gordon Davisson
              Sep 10 at 11:15











            • Yes, you're right - my fault. Thanks for letting me know, I've corrected the error.
              – Bario Malotelli
              Sep 10 at 11:59










            • Link-only answers are discouraged, as links go dead all the time. Please make the answer self-contained by quoting the relevant parts of the linked resources.
              – fkraiem
              Sep 10 at 12:20















            Correction: it's "deniable encryption". Web searches will work better with the correct spelling :-) And there's a tag for it here on crypto.se: deniable-encryption.
            – Gordon Davisson
            Sep 10 at 11:15





            Correction: it's "deniable encryption". Web searches will work better with the correct spelling :-) And there's a tag for it here on crypto.se: deniable-encryption.
            – Gordon Davisson
            Sep 10 at 11:15













            Yes, you're right - my fault. Thanks for letting me know, I've corrected the error.
            – Bario Malotelli
            Sep 10 at 11:59




            Yes, you're right - my fault. Thanks for letting me know, I've corrected the error.
            – Bario Malotelli
            Sep 10 at 11:59












            Link-only answers are discouraged, as links go dead all the time. Please make the answer self-contained by quoting the relevant parts of the linked resources.
            – fkraiem
            Sep 10 at 12:20




            Link-only answers are discouraged, as links go dead all the time. Please make the answer self-contained by quoting the relevant parts of the linked resources.
            – fkraiem
            Sep 10 at 12:20

















             

            draft saved


            draft discarded















































             


            draft saved


            draft discarded














            StackExchange.ready(
            function ()
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fcrypto.stackexchange.com%2fquestions%2f62222%2ftwo-working-decipher-keys-giving-various-valid-results-for-one-ciphered-message%23new-answer', 'question_page');

            );

            Post as a guest













































































            這個網誌中的熱門文章

            Why am i infinitely getting the same tweet with the Twitter Search API?

            Is there any way to eliminate the singular point to solve this integral by hand or by approximations?

            Strongly p-embedded subgroups and p-Sylow subgroups.