#943: Unbreakable: One-Time Pads and the Mystery of V-32

Discover why the one-time pad is the only unbreakable code and go inside the eerie world of shortwave number station V-32.

0:000:00
Episode Details
Published
Duration
27:24
Audio
Direct link
Pipeline
V4
TTS Engine
chatterbox-regular
LLM

AI-Generated Content: This podcast is created using AI personas. Please verify any important information independently.

In the high-stakes world of modern cryptography, we are often told that any code can be broken given enough time and computing power. However, there is one notable exception: the one-time pad. Based on the principle of "perfect secrecy" defined by Claude Shannon, the one-time pad is the only encryption method mathematically proven to be unbreakable. Unlike modern algorithms that rely on "computational hardness," the one-time pad is shielded by pure information theory.

The Logic of Perfect Secrecy

The strength of a one-time pad lies in its simplicity and its requirements. To encrypt a message, one uses a key of completely random characters that is at least as long as the message itself. By combining the message with the key—often using modulo 26 addition—the resulting ciphertext becomes a string of random noise.

The reason this is unbreakable is that the ciphertext could represent any possible message of that length. If an interceptor tries to brute-force the code, they will find keys that translate the noise into every conceivable word or phrase. Without the specific physical key, there is no mathematical way to distinguish the real message from a sea of equally plausible decoys.

The Human Element and the Venona Project

While the system is mathematically perfect, it is vulnerable to human error. The most famous example is the Venona project, where United States and British intelligence successfully decrypted thousands of Soviet messages during the Cold War. The breakthrough didn't happen because the math failed, but because the key production process became compromised.

Due to the pressures of World War II, Soviet manufacturers began printing duplicate pages for their one-time pads. Reusing a key even once creates a mathematical relationship between two different messages, allowing codebreakers to strip away the randomness. This single lapse led to the exposure of high-level spy rings, proving that the most secure system is only as strong as its implementation.

Number Stations and the Shadow War

The one-time pad remains a staple of espionage today, often paired with the eerie phenomenon of number stations. These shortwave radio stations broadcast strings of numbers or digital tones to listeners across the globe. Because shortwave signals bounce off the ionosphere, they can be received thousands of miles away using simple, off-the-shelf equipment.

This medium offers total anonymity. Unlike digital communications, which leave metadata trails and IP footprints, a radio broadcast is a one-way transmission into the void. A recipient can listen in a public park with a transistor radio, and no authority can prove they were the intended target.

The Mystery of V-32

Currently, the radio community is focused on V-32, a digital station utilizing multi-frequency shift keying (MFSK). Sounding like a series of mechanical chirps, V-32 has been traced to high-power transmitters likely operated by state actors. In the volatile landscape of 2026, these signals are believed to be the primary link between intelligence agencies and "sleeper" assets in hostile territories.

While governments can throttle the internet or monitor VPNs, they cannot stop the physics of a radio wave. As long as there is a need for untraceable, unbreakable communication, the one-time pad and the mysterious voices of the shortwave bands will continue to haunt the airwaves.

Downloads

Episode Audio

Download the full episode as an MP3 file

Download MP3
Transcript (TXT)

Plain text transcript file

Transcript (PDF)

Formatted PDF with styling

Read Full Transcript

Episode #943: Unbreakable: One-Time Pads and the Mystery of V-32

Daniel Daniel's Prompt
Daniel
"I’d like to explore the concept of the one-time cipher and understand what makes it impossible to break. I’m also interested in its potential connection to number stations, such as the recently active station V32, and how these methods are used for secure communication."
Corn
Hey everyone, welcome back to My Weird Prompts. We are coming to you, as always, from our home here in Jerusalem. It is a beautiful, slightly chilly evening here in the city of gold, and I have got a fresh pot of coffee going. I am Corn Poppleberry, and I am sitting here with my brother, the man who spent three hours yesterday trying to calibrate a shortwave antenna on our balcony, Herman Poppleberry.
Herman
It was a necessary calibration, Corn. You cannot just throw a wire over the railing and expect to catch signals from the other side of the world. But you are right, it is great to be here. And honestly, this is one of those topics that I have been itching to talk about for a long time. Our housemate Daniel really hit the nail on the head with this one. He sent us a prompt about one-time ciphers and those mysterious number stations, specifically this station V-thirty-two that has been making waves lately in the radio community. It is a rabbit hole that goes deep into the history of the Cold War, but it is also incredibly relevant to what is happening right now in two thousand twenty-six.
Corn
It is a classic intersection of high-level mathematics and old-school spycraft. Daniel mentioned in his message that he is not exactly a math whiz, which I think is true for most people listening, myself included. But the beauty of the one-time pad is that the logic is actually very elegant once you see it. It is the only encryption method that is mathematically proven to be unbreakable. Not just difficult to break, not just requiring a supercomputer, but literally impossible. That is a heavy claim in a world where we are told everything can be hacked.
Herman
That distinction is huge. We have talked about quantum-resistant cryptography in the past, specifically in episode six hundred thirty-four when we were looking at Air Force One and how the President communicates. But even those advanced algorithms are built on the idea of computational hardness. They rely on the fact that it would take a trillion years for a classical computer to guess the key. The one-time pad is different. It is based on information theory. Even if you had all the computing power in the universe, even if every atom in the galaxy was a processor working on the problem, you still could not crack it.
Corn
So, let us start there, Herman. For Daniel and for the listeners who might be scratching their heads, how can something be truly unbreakable? Most of us are used to the idea that if a human made it, another human can break it. What is the secret sauce here? How do we get from a string of numbers to "impossible to solve"?
Herman
It comes down to a concept called perfect secrecy. This was formally defined by Claude Shannon, the father of information theory, back in the late nineteen forties in his paper "Communication Theory of Secrecy Systems." To understand it, you have to look at how a one-time pad actually works. You start with your message, let us say it is the word HELLO. You then have a key, which is a string of completely random characters that is at least as long as your message. This is the crucial part. The key must be truly random, it must be used only once, and it must be kept secret.
Corn
Right, and the randomness is the key, literally and figuratively. If I have the word HELLO and my key is just a bunch of random letters, let us say X, Q, J, L, P, I am going to combine them. In the old days, they would do this with simple addition. A is one, B is two, and so on. You add the message letter to the key letter, and you get a new, encrypted letter.
Herman
It is often called modulo twenty-six addition. If your result is higher than twenty-six, you just start over at the beginning of the alphabet. Now, here is why it is unbreakable. Imagine you are an interceptor. You see the encrypted message, which just looks like total gibberish. Because the key was truly random, that gibberish could represent literally any five-letter word in existence. If the ciphertext is, say, Q-W-E-R-T, and you try to brute-force it by guessing every possible key, you will eventually find a key that turns Q-W-E-R-T into HELLO. But you will also find a key that turns it into APPLE, or STONE, or WATER, or KILL-X.
Corn
So you are left with a list of perfectly valid messages and no way to tell them apart.
Herman
None. Every possible message of that length is equally likely. That is the definition of perfect secrecy. In any other type of encryption, like the stuff we use for our banking or our emails today in March of two thousand twenty-six, there is a mathematical structure. If you guess the wrong key, the output still looks like gibberish. But with a one-time pad, the output could look like a perfectly valid, different message. You have zero information to tell you which one is correct. You are not looking for a needle in a haystack; you are looking for a specific needle in a haystack made entirely of identical needles.
Corn
It is a remarkably simple concept because it is so low-tech in a way. You do not need a computer. You just need a pad of paper with random letters on it. But as you mentioned, there are some very strict rules. If you break even one of those rules, the whole thing collapses. It is like a high-wire act where the slightest breeze can send you falling.
Herman
It really is. This is where the history gets really interesting and where the "weird" factor kicks in. The most famous example of this is the Venona project. This was a long-running collaboration between United States and British intelligence agencies during the Cold War. They were intercepting Soviet diplomatic traffic. Now, the Soviets were using one-time pads, which should have been unbreakable. But during the chaos of the Second World War, the Soviet manufacturing plant for these pads got lazy or overwhelmed. They started printing duplicate pages. They reused the keys.
Corn
That is the cardinal sin of the one-time pad. It is in the name. One-time. If you use it twice, you have basically handed the keys to the kingdom to your enemy.
Herman
That is the danger. As soon as you use the same key for two different messages, you create a mathematical relationship between those two messages. The randomness cancels out. If I add the same random number to two different letters, the difference between the two resulting encrypted letters is the same as the difference between the two original letters. The American and British codebreakers, including some legendary figures at Arlington Hall like Meredith Gardner, realized this. They were able to use those overlaps to start peeling back the layers. They eventually cracked thousands of messages, which led to the discovery of high-level Soviet spies like the Rosenbergs and Kim Philby.
Corn
It just goes to show that even the most perfect system is only as good as the humans running it. If you get lazy with your key generation or your distribution, you are finished. And that brings us to the second part of Daniel's prompt, which is how this connects to number stations and specifically this station V-thirty-two that has been active lately.
Herman
To that point, number stations are one of the great lingering mysteries of the Cold War that are still very much alive today. For those who do not know, these are shortwave radio stations that broadcast nothing but strings of numbers or letters, often read by a synthesized voice. They have been heard for decades. And the prevailing theory, which is almost certainly correct, is that they are used by intelligence agencies to send instructions to spies in the field.
Corn
And the reason they use shortwave radio is brilliant in its simplicity. Shortwave signals can travel thousands of miles by bouncing off the ionosphere. This is what we call skywave propagation. You can sit in a basement in London or a safe house in Tehran and pick up a signal from halfway across the world with a cheap, off-the-shelf radio receiver. You do not need an internet connection. You do not need a satellite dish. You just need a piece of wire and a battery-powered radio.
Herman
And importantly, it is completely anonymous. If I send you an encrypted email, there is a digital trail. The internet service providers know that an encrypted packet went from point A to point B. Even with a V-P-N, there are metadata footprints. But with a radio broadcast, the agency is just shouting into the void. They have no idea who is listening. A spy can sit in a park with a transistor radio and a pair of headphones, and no one would ever know they are receiving a top-secret command. They are just one of millions of people who could be tuned into that frequency.
Corn
This is where the one-time pad comes back in. The spy has a tiny physical pad of paper, maybe hidden in the lining of a coat or a hollowed-out coin. These pads were often printed on flammable cellulose or even silk so they could be easily destroyed or swallowed in an emergency. They listen to the number station, write down the numbers, and then use their pad to decrypt the message. Once the message is read, they tear off the page and burn it. It is the ultimate secure communication. No digital footprint, no way to trace the recipient, and mathematically unbreakable encryption.
Herman
Now, let us talk about V-thirty-two. This is a station that has been getting a lot of attention recently on sites like Priyom dot org, which is a community of hobbyists who track these things. V-thirty-two is a digital station, meaning instead of a voice reading numbers, it sends out a series of tones that represent data. It uses a mode called multi-frequency shift keying, or M-F-S-K. To the casual listener, it sounds like a weird, warbling mechanical bird or a series of digital chirps. It has been traced to several locations, but recently there has been a lot of activity that points toward the Middle East.
Corn
The timing is very interesting. Daniel mentioned that there is speculation about it being related to the Iranian Revolutionary Guard Corps, or the I-R-G-C, or perhaps Mossad or the C-I-A. Given where we are sitting right now in Jerusalem, this feels very close to home. We are in a region where the "shadow war" is constantly playing out on these frequencies.
Herman
It really does. There was a notable transmission just a few days ago, on February twenty-eighth, two thousand twenty-six. It was broadcasting at seven thousand nine hundred ten kilohertz. The signal was incredibly strong, peaking at over sixty decibels over the noise floor in some parts of Europe and the Mediterranean. When you see that kind of power, you know it is a state actor. This is not some amateur in a garage. This is a multi-million dollar transmitter array, likely using a curtain antenna that can steer the beam toward specific geographic targets.
Corn
And the theory is that V-thirty-two is being used to communicate with "sleeper cells" or assets in high-tension areas. If you are an intelligence agency operating in a hostile environment, you cannot rely on the internet. Governments like the one in Tehran are incredibly good at monitoring digital traffic. They have their own domestic intranet, they throttle speeds during protests, and they track every V-P-N. But they cannot stop a shortwave radio signal from crossing their borders. It is physics. You cannot "block" the ionosphere.
Herman
Precisely. And if the I-R-G-C is using V-thirty-two to talk to their proxies in the region, or if Mossad is using it to talk to assets inside Iran, the one-time pad is the only way to go. It ensures that even if the Iranian government intercepts the signal, which they obviously do, they can never know what it says. They just hear a series of digital chirps. They can record it, they can analyze it with the best supercomputers in the world, but without that specific physical pad, it is just noise.
Corn
It is a bit of a cat-and-mouse game, though. Even if they cannot read the message, they can use direction finding, or triangulation, to locate the transmitter. We have seen this happen with stations like the "Buzzer" in Russia or the "Lincoln" station. But for the receiver, the person on the ground, they are safe as long as they are not caught with the physical pad. That is the "Achilles' heel" of the system. In the digital age, having a physical piece of paper with random numbers is a huge liability. If you get caught with that during a search, you are done.
Herman
That is why we have seen the evolution of "digital" one-time pads. You can hide the key inside a normal-looking file, like a high-resolution photo of a cat or a piece of music, using steganography. We actually touched on some of these hidden communication methods in episode five hundred thirty-seven when we talked about the architecture of secrecy. But even with digital versions, the core principle remains the same. You need that secret key that is as long as the message and used only once.
Corn
I want to push back a little on the practical side of this, Herman. If the one-time pad is so perfect and unbreakable, why are we not using it for everything? Why do I have to worry about my WhatsApp encryption or my banking security if this solution has existed since the nineteen teens? It seems like we solved the problem a hundred years ago and then just decided to use less secure methods.
Herman
That is the million-dollar question, Corn. The answer is the "key distribution problem." For a one-time pad to work, both the sender and the receiver must have an identical copy of the random key before the message is sent. And they have to exchange that key through a secure channel.
Corn
So if I want to send you a secret message, I first have to meet you in person and give you a physical copy of the key?
Herman
You've got it. Or I have to send it to you via a trusted courier in a diplomatic bag. If we already have a secure way to exchange a key that is as long as the message, why not just use that secure channel to send the message itself?
Corn
Ah, I see. It is a bit of a circular problem. The only time it really makes sense is when you have a window of opportunity to exchange keys now, for messages you will need to send in the future when the secure channel is no longer available.
Herman
Right. Like a spy who is being deployed. Before they leave for their mission, they are given a year's worth of one-time pads. They can then receive unbreakable messages for the next twelve months without ever having to meet their handler again. But for you and me, or for a bank with millions of customers, it is completely impractical. We cannot go around handing out physical pads to everyone we might want to talk to. Imagine the logistics of a bank trying to deliver a one-time pad to every customer's house every month.
Corn
That is why we use public-key cryptography instead. It allows us to establish a secure connection with someone we have never met. It is not "perfectly" secure in the mathematical sense, but it is "practically" secure because the math is so hard to undo. But as you always point out, once quantum computers become powerful enough, that "practically" secure math might start to look very shaky. We are already seeing the "Harvest Now, Decrypt Later" strategy being used by major powers.
Herman
Which is why the one-time pad is actually seeing a bit of a resurgence in certain high-level government circles in two thousand twenty-six. If you are worried about an adversary stealing your encrypted data today and waiting ten years for a quantum computer to crack it, the one-time pad is your only defense. A one-time pad message captured today will still be unbreakable in a thousand years, no matter how fast computers get. It is future-proof.
Corn
The geopolitical side of this is wild. If the United States, for example, is using one-time pads for its most sensitive diplomatic cables, they are essentially future-proofing their secrets. I think about the stuff we discussed in episode four hundred sixty-six about the engineering of modern S-C-I-Fs, those secure rooms where no signals can get in or out. Even inside a secure facility, you still need to communicate with the outside world.
Herman
And you can bet they are using the most robust methods possible. There is a reason the "red phone" between Washington and Moscow, which we talked about in the Air Force One episode, was originally secured using one-time pads. They would literally fly canisters of punched paper tape between the two capitals. It was the only way to ensure that neither side could eavesdrop on the most sensitive conversations that were preventing nuclear war. It is the ultimate insurance policy.
Corn
It is amazing that the most sophisticated technology in the world often relies on these very fundamental, almost primitive concepts. It is like the hand-crank radios we talked about in episode eight hundred eighty-nine. When the high-tech stuff fails, or when it is compromised, you go back to the physics and the math that you know cannot be cheated.
Herman
That's the reality. And speaking of things that cannot be cheated, I want to go back to V-thirty-two and the Iranian angle. There is a lot of talk right now about how the I-R-G-C is modernizing their asymmetrical warfare capabilities. They know they cannot compete with the United States or Israel in a conventional head-to-head military conflict. So they invest in these low-signature, high-security communication methods. They are leaning into the "old ways" because the "old ways" are actually more resilient against modern cyber-warfare.
Corn
It is a smart move. If you are coordinating proxies in Lebanon, Yemen, or Iraq, you want a system that is robust. Shortwave radio is very hard to jam completely over a large area. You can jam a specific frequency in a specific city, but jamming the entire shortwave spectrum across the whole Middle East is nearly impossible. It would require an enormous amount of power and would interfere with everything else, including your own communications.
Herman
And if you are the one receiving the message, all you need is a wire antenna and a basic knowledge of how to use your pad. It is very decentralized. It fits the whole "revolutionary" model that the I-R-G-C prides itself on. They want to be able to operate even if their central command is disrupted. It is a form of "guerrilla radio" that is mathematically fortified.
Corn
I wonder, though, if the rise of satellite internet like Starlink or the new cellular-to-satellite technologies will eventually make number stations obsolete. If you can get an encrypted signal anywhere on earth via a satellite, do you still need a giant radio tower in the desert?
Herman
I think there is still a place for it, mainly because of the "anonymity" factor I mentioned earlier. Even with Starlink, you need a terminal. That terminal has a signature. It can be tracked. It can be seen by a drone with thermal imaging. If you are in a conflict zone and you turn on a satellite terminal, you are basically screaming "I am here" to every electronic intelligence aircraft in the area. But a guy with a tiny radio receiver is invisible. He looks like any other person listening to the news or music. In the world of espionage, being invisible is often more important than being fast.
Corn
I can see why that's a major advantage. There is a certain "clandestine elegance" to it. It reminds me of those old stories about spies using invisible ink or microdots. It is about hiding in plain sight. It is about the human element.
Herman
And the one-time pad is the mathematical version of that. It hides the message in plain sight by making it indistinguishable from random noise. If you do not have the key, the message literally does not exist. It is just entropy. It is the heat death of information.
Corn
So, for Daniel, the takeaway here is that the one-time pad is the "Gold Standard." It is the only system we have that is truly, fundamentally unbreakable. The catch is that it is incredibly difficult to manage. You need perfect randomness, no reuse, and a secure way to get the keys to the right people. It is a high-maintenance relationship, but it is the only one that will never betray you.
Herman
Precisely. And if you are interested in the "weird" side of it, keep an eye on those number stations. V-thirty-two is just one of many. There is the "Buzzer" in Russia, which has been humming for decades and occasionally broadcasts names and numbers, and various others that pop up whenever there is a global crisis. They are the heartbeat of the secret world. If you listen closely to the static, you are hearing the gears of history turning.
Corn
It is a rabbit hole you can fall down very easily. I spent half the night yesterday looking at spectrograms of V-thirty-two transmissions. There is something haunting about it. You are looking at the literal "ghosts in the machine," these signals that are carrying instructions that could change the course of history, and they are just floating through the air right past us while we are watching Netflix.
Herman
It is a reminder that there is a lot more going on in the world than what we see on our social media feeds. There is a whole layer of reality that is encrypted, hidden, and broadcast on frequencies most people never even think to check. It is the "dark web" of the airwaves.
Corn
Well, I think we have given Daniel a lot to chew on. The math is simple, the implementation is hard, and the implications are global. It is a perfect "My Weird Prompts" topic. It combines that sense of mystery with hard science and a touch of paranoia.
Herman
It really does. And it makes me appreciate the security we have, even if it is not "perfectly" secure in the Shannon sense. We have come a long way since the days of punched paper tape, but in a lot of ways, we are still standing on the shoulders of those early cryptographers who realized that randomness is the ultimate shield.
Corn
I couldn't agree more. Before we wrap up, I want to say a huge thank you to everyone who has been listening. We are nearing a thousand episodes, which is just mind-blowing to me. We started this in a tiny apartment with one microphone, and now we are talking to people all over the world from Jerusalem. If you are enjoying the show, please take a second to leave us a review on your podcast app or on Spotify. It really does help other people find us, and we love hearing your feedback.
Herman
Yeah, it makes a big difference. And if you want to get in touch or check out our archive of over nine hundred episodes, head over to myweirdprompts dot com. You can find all the episodes we mentioned today, like the ones on atomic clocks or S-C-I-Fs, and there is a contact form if you have a "weird prompt" of your own. We read every single one of them.
Corn
Who knows, your question might be the focus of our next deep dive. We are always looking for new rabbit holes to explore. Whether it is about ancient languages, weird physics, or the secret history of the internet, we want to hear it.
Herman
We certainly do. Keep them coming. We live for this stuff. It is what keeps us curious and, hopefully, keeps you guys entertained.
Corn
Alright, that is going to do it for us today. Thanks for joining us in Jerusalem. I am Corn Poppleberry.
Herman
And I am Herman Poppleberry. We will see you next time.
Corn
This has been My Weird Prompts. Stay curious, everyone.
Herman
And stay secure.
Corn
Bye for now.
Herman
Goodbye.

This episode was generated with AI assistance. Hosts Herman and Corn are AI personalities.