For over 400 years, the problem remained.

How could Alice design a cipher that hides her fingerprint,

thus stopping the leak of information?

The answer is randomness.

Imagine Alice rolled a 26 sided die

to generate a long list of random shifts,

and shared this with Bob instead of a code word.

Now, to encrypt her message, Alice

uses the list of random shifts instead.

It is important that this list of shifts

be as long as the message, as to avoid any repetition.

Then she sends it to Bob, who decrypts the message using

the same list of random shifts she had given him.

Now Eve will have a problem, because the resulting

encrypted message will have two powerful properties.

One, the shifts never fall into a repetitive pattern.

And two, the encrypted message will have a uniform frequency

distribution.

Because there is no frequency differential and therefore

no leak, it is now impossible for Eve

to break the encryption.

This is the strongest possible method of encryption,

and it emerged towards the end of the 19th century.

It is now known as the one-time pad.

In order to visualize the strength of the one-time pad,

we must understand the combinatorial explosion

which takes place.

For example, the Caesar Cipher shifted every letter

by the same shift, which was some number between 1 and 26.

So if Alice was to encrypt her name,

it would result in one of 26 possible encryptions.

A small number of possibilities, easy to check them all,

known as brute force search.

Compare this to the one-time pad, where each letter would

be shifted by a different number between 1 and 26.

Now think about the number of possible encryptions.

It's going to be 26 multiplied by itself five times, which

is almost 12 million.

Sometimes it's hard to visualize,

so imagine she wrote her name on a single page,

and on top of it stacked every possible encryption.

How high do you think this would be?

With almost 12 million possible five-letter sequences,

this stack of paper would be enormous,

over one kilometer high.

When Alice encrypts her name using the one-time pad,

it is the same as picking one of these pages at random.

From the perspective of Eve, the code breaker,

every five letter encrypted word she

has is equally likely to be any word in this stack.

So this is perfect secrecy in action.