Noah Brier | April 2, 2026
The One-Time Pad Edition
On codes, human error, and the Cold War.

Colin here. There is exactly one encryption system in human history that has been mathematically proven to be unbreakable. Provably, permanently, categorically unbreakable — even to an adversary with infinite computational resources, including a quantum computer that doesn’t exist yet.
It’s called the one-time pad. It’s also, in practice, nearly useless. And that tension is the story.
Why is this interesting?
The mechanics are elegant and simple. You take a message, combine each character with a corresponding character from a truly random key — the “pad” — using simple modular arithmetic, and the result is ciphertext that isn’t merely hard to crack, but informationally empty. An interceptor who tried every possible key wouldn’t get closer to the truth; they’d generate every possible message of that length, all equally plausible.
The catch: the system is only as secure as the key exchange. The pad must be at least as long as the message, genuinely physically random (measuring radioactive decay is one method), used exactly once, and pre-shared through a channel secure enough to resist interception. Which creates a certain irony: if you already have a channel secure enough to share the key, you could have sent the message through it to begin with.
In practice, this made the one-time pad a courier problem, not a cryptography problem. KGB field agents carried their pads printed on nitrocellulose flash paper, a material designed to combust completely, leaving nothing behind. Rudolf Abel, the Soviet spy arrested in New York in the 1950s, had one when he was caught. The Moscow-Washington hotline established after the Cuban Missile Crisis ran on commercial one-time tape, with each side preparing key material and exchanging it through embassies. Neither country had to reveal their encryption methods to the other.
The Venona project, the NSA’s decades-long effort to break Soviet wartime communications, succeeded not because anyone cracked the math but because Moscow’s cryptographic center — reportedly under pressure with German troops approaching the city in late 1941 — produced duplicate pages of key material. They reused the pad. Violated the first rule of the game. (Among the intelligence recovered: confirmation of atomic espionage at Los Alamos.)
It traveled further than the Cold War. The African National Congress used a disk-based version for Operation Vula in the late 1980s, running a covert network inside apartheid South Africa, with a Belgian flight attendant serving as the key courier. Quantum key distribution, the current bleeding edge of cryptographic research, is essentially a physics-level attempt to finally solve the courier problem — using the measurable disturbance of quantum states to detect any interception of the key itself.
What makes the one-time pad interesting isn’t the math. It’s that the limiting factor was always trust, logistics, and human error under pressure — the same things that compromise nearly every security system. We built a provably perfect lock and handed the key to a person in a hurry. (CJN)