![]() |
![]() ![]() |
![]() |
![]()
Post
#26
|
|
Moving Target ![]() ![]() Group: Members Posts: 209 Joined: 7-June 09 Member No.: 17,251 ![]() |
Toobox - It means that if you want to exploit your way into the node you need to run a sucessful Decrypt with an interval of 24 hours before hand. It's a stalling method, not a show stopper. It also doesn;t hit the logs neccessarily because you aren't making an Exploit test so the firewall doesn't roll. A lesson to all Shadowrun admins, 24 hour encryption on a node only means you have to make yourself ready for the most stalwart of hackers. Not quite sure what you're getting at here. My posts are strictly addressing the OP's proposed scenario of strong encryption on the access log itself. I know how strong encryption works in terms of breaking it; my point is just that the time requirement applies to using it as well. |
|
|
![]()
Post
#27
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,536 Joined: 13-July 09 Member No.: 17,389 ![]() |
I'm not arguing with you on real-world encryption, but remember that the whole encryption/decryption dynamic is vastly different in the sixth world, largely due to playability requirements. It's to be assumed that strong encryption is not the type of encryption we're familiar with irl, or everyone would always use it. According to RAW: Emphasis mine. Strong encryption takes a hell of a long time to use as well as to break. If encrypting an access log requires an Encrypt program dedicated to the purpose, it's obviously not just a one-shot deal. Therefore, every time it encrypts something new in the log - presumably every entry - it should take 24 hours (or whatever interval the admin has set) to do so. A generous GM would interpret that as just a constant 24-hour window where any given log entry is stored as plaintext (so the last 24 hours of activity are unencrypted but everything older is secure), but a stricter GM could say that each individual entry demands the Encrypt program's full attention for 24 hours. Under this reading, if the access log gets more than one new entry per day it's quickly going to fall behind and accumulate a huge backlog of unencrypted entries. According to page 224... QUOTE Encryption and Decryption Files, signals, and devices may all be encrypted with a Simple Action. If you have the proper key, decrypting takes only a Simple Action. Without a key, you must employ a battery of advanced sampling, pattern-matching, and brute force attacks to bypass the encryption. Make a Decrypt + Response (Encryption ratingx2, 1 Combat Turn) Extended Test to break the encryption. What you read is decrypting with the key. I think I could probably encrypt Mirage in about 24 hours.... |
|
|
![]()
Post
#28
|
|
Moving Target ![]() ![]() Group: Members Posts: 695 Joined: 2-January 07 From: He has here a minute ago... Member No.: 10,514 ![]() |
Not quite sure what you're getting at here. My posts are strictly addressing the OP's proposed scenario of strong encryption on the access log itself. I know how strong encryption works in terms of breaking it; my point is just that the time requirement applies to using it as well. I was referring to your mention of 24 hour encryption at the node level and how that effects accessing said node. As for encryption of the log in real time, I believe that having the dedicated Encrypt program running on the log means that the log is encrypted in real time. If a GM wanted to have the logs in plain text for 24 hours then the Encrypt would only have to run once for each peroid they wanted the log encrypted for. Think of it more like signal encryption, where it's running constantly encrypting on the fly. The only difference is that you can't use 24 hour encryption with signals, the fluff reason most likely because you are communicating between two nodes. Game reason because you'd never be able to spoof or break communications without taking a node offline. |
|
|
![]()
Post
#29
|
|
Moving Target ![]() ![]() Group: Members Posts: 209 Joined: 7-June 09 Member No.: 17,251 ![]() |
What you read is decrypting with the key. I think I could probably encrypt Mirage in about 24 hours.... Nrr. No. What you just quoted is the rules for standard encryption, not strong. Re-read my quote and keep in mind what it is that actually determines the interval for decryption of strong encryption - it's the time taken to encrypt the thing in the first place. This is shown in the second bit I bolded in my Unwired quote above. |
|
|
![]()
Post
#30
|
|
Moving Target ![]() ![]() Group: Members Posts: 209 Joined: 7-June 09 Member No.: 17,251 ![]() |
I was referring to your mention of 24 hour encryption at the node level and how that effects accessing said node. Oh, whoops. My bad - I mistyped "access log" as "access node." I meant to be talking about the log itself. QUOTE As for encryption of the log in real time, I believe that having the dedicated Encrypt program running on the log means that the log is encrypted in real time. If a GM wanted to have the logs in plain text for 24 hours then the Encrypt would only have to run once for each peroid they wanted the log encrypted for. Think of it more like signal encryption, where it's running constantly encrypting on the fly. The only difference is that you can't use 24 hour encryption with signals, the fluff reason most likely because you are communicating between two nodes. Game reason because you'd never be able to spoof or break communications without taking a node offline. That sounds reasonable, but I still think my reading does as well. |
|
|
![]()
Post
#31
|
|
Moving Target ![]() ![]() Group: Members Posts: 695 Joined: 2-January 07 From: He has here a minute ago... Member No.: 10,514 ![]() |
|
|
|
![]()
Post
#32
|
|
Moving Target ![]() ![]() Group: Members Posts: 209 Joined: 7-June 09 Member No.: 17,251 ![]() |
Agreed. Depends on how much of a bastard the GM wants to be. Yeah, but also which side suffers - you could easily say that allowing realtime strong encryption for access logs is a higher level of bastardry than not, from the hacker's perspective. From the POV of someone trying to protect their data, though... |
|
|
![]()
Post
#33
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,536 Joined: 13-July 09 Member No.: 17,389 ![]() |
Yeah, but also which side suffers - you could easily say that allowing realtime strong encryption for access logs is a higher level of bastardry than not, from the hacker's perspective. It serves both sides equally, since the hacker can use the same strong encryption to protect his node/data. I honestly have no idea why they are referring to cryptanalysis as a method of encryption. That literally defies the basic construction of the word, regardless of any specific definition in the English language. I've come to the conclusion that their hacking is significantly abstracted to make it a low barrier to players playing it, while still allowing it to "feel" right to non-technical players. |
|
|
![]()
Post
#34
|
|
Moving Target ![]() ![]() Group: Members Posts: 209 Joined: 7-June 09 Member No.: 17,251 ![]() |
It serves both sides equally, since the hacker can use the same strong encryption to protect his node/data. Oh, I know. I meant that depending on what the PCs happen to be doing at the time, either allowing or disallowing realtime strong encryption on access logs could result in the GM being called a bastard. (IMG:style_emoticons/default/biggrin.gif) QUOTE I honestly have no idea why they are referring to cryptanalysis as a method of encryption. That literally defies the basic construction of the word, regardless of any specific definition in the English language. Agreed. Cryptography:encryption::cryptanalysis:decryption. The terms aren't interchangeable. |
|
|
![]()
Post
#35
|
|
Neophyte Runner ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,086 Joined: 26-February 02 Member No.: 364 ![]() |
Access logs can be encrypted. Strong encryption can require up 24 hours MINIMUM to break. One possible interpertation: Strong Encryption is not allowed for Signals Encrpytion, presumably because encrypting a signal involves real-time data processing. Access logs have their own restrictions (no bundling IC or Data Bombs) explicitly because the data is changing in real time. While the book never specifically states it, at my table, I've treated Access Log Encryption as a special case of Signals Encryption. |
|
|
![]()
Post
#36
|
|
Moving Target ![]() ![]() Group: Members Posts: 509 Joined: 16-June 09 Member No.: 17,282 ![]() |
I mean, the methods presented by you wond'rous people make perfect sense. I'm only going to share how I initially saw strong encryption working on an access log.
What I figured would be that it would take 24 hours to generate the algorithm (or what-have-you) for the access log, after which all of the information entering the log would be encrypted in real-time. I figure giving hackers 24 hours before the access log updates is really too generous. |
|
|
![]()
Post
#37
|
|
Great Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,537 Joined: 27-August 06 From: Albuquerque NM Member No.: 9,234 ![]() |
Logically they way you do an encrypted access log is by having the process write blocks of encrypted data to a text file. All records are the same size, with zero fill to the block size, with a time stamp and serial number to pick up deletion of records.
However if you own the box you own the log crypto process, which includes the crypto variables it needs to start up again. So you edit the last 20 seconds out of the log and forge your own records with serial numbers and time stamps, as the process has to keep track of these internally and you can pull them out the process space. This works even if it's writing the log as a one-way function (the host can't decode the logs). Having full system rights on a box is really powerful, though you'd have to have experimented to build the scripts to do this kind of stuff fast and reliably. Having the host write the logs in real time to a logging system is the best defense against this. |
|
|
![]()
Post
#38
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,536 Joined: 13-July 09 Member No.: 17,389 ![]() |
Logically they way you do an encrypted access log is by having the process write blocks of encrypted data to a text file. All records are the same size, with zero fill to the block size, with a time stamp and serial number to pick up deletion of records. No, if each record is written as an encrypted block to a plain text file you do not want to make each record an identical length. That's -very- bad because it establishes patterns that make cryptanalysis much easier. QUOTE However if you own the box you own the log crypto process, which includes the crypto variables it needs to start up again. So you edit the last 20 seconds out of the log and forge your own records with serial numbers and time stamps, as the process has to keep track of these internally and you can pull them out the process space. This works even if it's writing the log as a one-way function (the host can't decode the logs). The startup variables only help you if the cryptokey isn't embedded within the crypto program and "passed" to it in the startup process. I was reading through Unwired about encryption and I discovered the handwaivery that made encryption as a speed bump so that it didn't completely defeat hackers. It's a BS mathematical algorithm that magically cracks any encryption algorithm. |
|
|
![]()
Post
#39
|
|
Moving Target ![]() ![]() Group: Members Posts: 695 Joined: 2-January 07 From: He has here a minute ago... Member No.: 10,514 ![]() |
I was reading through Unwired about encryption and I discovered the handwaivery that made encryption as a speed bump so that it didn't completely defeat hackers. It's a BS mathematical algorithm that magically cracks any encryption algorithm. I'm sorry, but do you really think a game with real world accurate cryptography rules would play well with all the magic and guns? It's hand waving, but it's necessary. Parts of this thread are getting way too real world technical when there's enough to talk about as far as how the game mechanics work. |
|
|
![]()
Post
#40
|
|
Great Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,537 Joined: 27-August 06 From: Albuquerque NM Member No.: 9,234 ![]() |
No, if each record is written as an encrypted block to a plain text file you do not want to make each record an identical length. That's -very- bad because it establishes patterns that make cryptanalysis much easier. No, you pad the block prior to encryption. Block ciphers just work on uniform sized chunks of text. QUOTE The startup variables only help you if the cryptokey isn't embedded within the crypto program and "passed" to it in the startup process. In that case you can attack it offline, as every copy of the program has the same internal crypto settings. |
|
|
![]()
Post
#41
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,536 Joined: 13-July 09 Member No.: 17,389 ![]() |
No, you pad the block prior to encryption. Block ciphers just work on uniform sized chunks of text. It doesn't matter if you pad before, after, or randomly within the block. It makes it easier to attack the algorithm to figure out the key. The randomized padding only helps deter on small numbers of records. However a transaction log contains a large number of records, which patterns will emerge that will allow you to determine what the block length is and consequently be able to determine what part of the encrypted text indicates the time stamp. QUOTE In that case you can attack it offline, as every copy of the program has the same internal crypto settings. Actually, the most competent option would be to store the crypto-key in a secured data store which the application accesses to get the key while its running. So first you would have to lift a copy of the crypto program, then reverse engineer it to discover the location of the key, then crack into the data store that houses the key value or be able to sniff the key value while it's transmitted to the crypto program. |
|
|
![]()
Post
#42
|
|
Great Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,537 Joined: 27-August 06 From: Albuquerque NM Member No.: 9,234 ![]() |
It doesn't matter if you pad before, after, or randomly within the block. It makes it easier to attack the algorithm to figure out the key. The randomized padding only helps deter on small numbers of records. However a transaction log contains a large number of records, which patterns will emerge that will allow you to determine what the block length is and consequently be able to determine what part of the encrypted text indicates the time stamp. Pads are an essential part of block ciphers. If it encrypts 128 bytes per cycle it needs 128 bytes, not 127 or 129. And for a loggin function it would be designed such that every record is contained in one block. This prevents having to decrypt a a huge log file in order to add a record on the end using some sort of stream cypher, and simplifies it centralizing a large number of different logging subsystems. Since a well designed encryption algorithm using effective keys puts out essentially random noise that is not susceptible to analysis it really doesn't matter that you know the time stamp is in the front of the record. There isn't a 1:1 correlation between the plain text and crypto output, so changing one bit doesn't change one character on decryption, it mangles the entire block. |
|
|
![]() ![]() |
![]() |
Lo-Fi Version | Time is now: 16th May 2025 - 08:28 PM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.