Frank Miller: Inventor of the One-Time Pad

  title={Frank Miller: Inventor of the One-Time Pad},
  author={Steven M. Bellovin},
  pages={203 - 222}
Abstract The invention of the one-time pad is generally credited to Gilbert S. Vernam and Joseph O. Mauborgne. We show that it was invented about 35 years earlier by a Sacramento banker named Frank Miller. We identify which Frank Miller it was, and speculate on what might have led him to his idea. We also discuss whether or not Mauborgne might have known of Miller's work, especially via his colleague Parker Hitt. 
Vernam, Mauborgne, and Friedman: The One-Time Pad and the Index of Coincidence
It is shown that Friedman's attacks on the two-tape variant likely led to his invention of the index of coincidence, arguably the single most important publication in the history of cryptanalysis.
Further Information on Miller's 1882 One-Time Pad
These documents explain Miller’s threat model and show that he had a reasonably deep understanding of the problem; they also suggest that his scheme was used more than had been supposed.
Review of The New Codebreakers edited by P. Ryan, D. Naccache, and J.-J. Quisquater
The New Codebreakers is a collection of 33 essays that were written to honor David Kahn on the occasion of his 85th birthday in 2015 and covers a wide range from theoretical cryptography to security applications and from the history of intelligence to recreational applications.
The Impetus to Creativity in Technology
The author describes the ensuing developments from two now well-known publications in the twentieth century: a paper by Claude Shannon in 1948 and a patent by Horst Feistel in 1971, which contained significant and seminal technological results.
Looking Back - My Life as a Mathematician and Cryptographer
In this paper, the author looks back at his career as a mathematician and mathematical cryptographer, mainly concentrating on his student days and the early parts of his career.
Cryptography in a Quantum World
Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century before Claude Shannon gave it a strong mathematical foundation. However, Shannon's approach
How to explain modern security concepts to your children
Simple and intuitive explanations of various modern security concepts and technologies, including symmetric encryption, public key encryption, homomorphic encryption, intruder models, and security properties are presented.
The Early History of Voice Encryption
The evolution of voice encryption (a.k.a. ciphony) is detailed from the 1920s through the work of Alan Turing at the end of World War II. The systems covered are invertors, the A-3 Scrambler,
On extensions of the one-time-pad
This work proposes two extensions of OTP and proves a relation between block ciphers and Latin rectangles, which is needed to address cryptographic as well as operational weaknesses of the OTP.
Quantum generators of random numbers
The former concept of an entanglement-based quantum random number generator protocol with unconditionally secure public randomness verification is discussed, and a new prototype of fully operative miniaturized quantum random generator JUR02 producing a random bit sequence with velocity of 1 Mb/s is presented.


Come Retribution: The Confederate Secret Service and the Assassination of Lincoln
Many Confederates believed that Abraham Lincoln himself was the sponsor of the Union army's heavy destruction of the South. With John Wilkes Booth as its agent, the Confederate Secret Service devised
Wells, Fargo & Co. Stagecoach and Train Robberies, 1870-1884: The Corporate Report of 1885 with Additional Facts About the Crimes and Their Perpetrators
In January 1, 1885, Wells, Fargo & Company's chief detective James B. Hume and special agent John N. Thacker published a report summarizing the company's losses during the previous 14 years. It
Stagecoach: Wells Fargo and the American West
Any account of Wells Fargo & Company involves a history of the more dramatic aspects of the Old West. From 1852 to 1918, the company's operations bisected almost all social, cultural, and economic
In a briefing paper published online in December 2007 by the Institute for Women’s Policy Research, 90% of those 65 or older are said to receive Social Security benefits—for older women, Social
Cipher Printing Telegraph Systems For Secret Wire and Radio Telegraphic Communications
  • G. S. Vernam
  • Computer Science
    Transactions of the American Institute of Electrical Engineers
  • 1926
A printing telegraph cipher system devetoped during the World War for the use of the Signal Corps, U. S. Army is described, so designed that the messages are in secret form from the time they leave the sender until they are deciphered automatically at the office of the addressee.
The Codebreakers. New York: Macmillan
  • 1967
The Codebreakers. Macmillan
  • New York,
  • 1967
Banking Telegraphy: Combining Authenticity, Economy, and Secrecy, a Code for the Use of Bankers and Merchants
  • W.R. Gray,
  • 1876
Felix Tracy: Sacremento’s Veteran Expressman
  • Golden Notes Spring 1995
  • 1995