Encryption, can someone point me to the rules on this? |
Encryption, can someone point me to the rules on this? |
Jul 20 2010, 03:17 PM
Post
#1
|
|
Moving Target Group: Members Posts: 195 Joined: 31-January 10 Member No.: 18,100 |
As the title says, I would like to know the page numbers of where it gives the encryption rules, such as TN and how you go about breaking it. Thanks.
|
|
|
Jul 20 2010, 03:49 PM
Post
#2
|
|
Moving Target Group: Members Posts: 219 Joined: 16-November 09 From: United States Member No.: 17,876 |
The rules on encryption are screwy. The book redirects you like three times.
Engrypting: Make an Encryption + EW roll, hits x2 determines threshhold. You can encrypt almost anything. Nodes, subnodes, programs, access logs, databombs, icons. Decryption: Make an extended Decrypt + EW roll, interval one IP. Once you hit the threshold, you have the decryption key. |
|
|
Jul 20 2010, 04:09 PM
Post
#3
|
|
Prime Runner Group: Members Posts: 3,996 Joined: 1-June 10 Member No.: 18,649 |
Basically:
Assuming you have a hacker and a sys admin. Sys Admin EW 5 Encryption: 8 Math SPU, encephalon 2, Hot VR, Optimised Encryption. Dice Pool 19: Net Hits: 5-6 (max of 19) Threshold of 10 to 12 (potential max of 38) Hacker: EW: 5 Encryption: 6 Math SPU, Encephalon 2, Hot Vr, Optimised Decryption Dice Pool: 17 Net hits: 4-6 So the roughly best encryption in the world is going to take a hacker anywhere from 2 ip, to 9 ip. 3 combat rounds at the very most, assuming some amazingly lucky encryption. That's some crazy speedy decrypting. And fo course the Technomancer is rolling closer to 25 dice for the test. And so he's chewing through UV encryptions in a heartbeat. |
|
|
Jul 20 2010, 04:15 PM
Post
#4
|
|
panda! Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 |
i assume the book is SR4a. the actions are described on page 229 if you want to apply the encrypt program described on page 233, or decrypt something by way of a previously acquired key.
if you have no such key, there is the initiate cryptoanalysis action on page 230, using the decrypt program on page 233 (note that if you have the key you dont need to perform this action to gain access. key can be acquired in a number of ways, with at least one involving a love troll). there are expanded encryption rules on page 65 and 66 of unwired. |
|
|
Jul 20 2010, 04:20 PM
Post
#5
|
|
Immortal Elf Group: Dumpshocked Posts: 14,358 Joined: 2-December 07 From: Winnipeg, Manitoba, Canada Member No.: 14,465 |
|
|
|
Jul 20 2010, 04:22 PM
Post
#6
|
|
panda! Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 |
|
|
|
Jul 20 2010, 06:49 PM
Post
#7
|
|
Running Target Group: Members Posts: 1,190 Joined: 31-May 09 From: London, UK Member No.: 17,229 |
Engrypting: Make an Encryption + EW roll, hits x2 determines threshhold. You can encrypt almost anything. Nodes, subnodes, programs, access logs, databombs, icons. Where do you get that from? I don't see any roll for encrypting, and Unwired states that the enryption rating is usually the Encrypt program rating. |
|
|
Jul 20 2010, 06:55 PM
Post
#8
|
|
Moving Target Group: Members Posts: 219 Joined: 16-November 09 From: United States Member No.: 17,876 |
Where do you get that from? I don't see any roll for encrypting, and Unwired states that the enryption rating is usually the Encrypt program rating. Maybe I was wrong, I don't have my books with me. Will check when I get home. Either way, Encryption is still really weak, unless you have an agent running a dynamic encryption. |
|
|
Jul 20 2010, 07:09 PM
Post
#9
|
|
Prime Runner Group: Members Posts: 3,996 Joined: 1-June 10 Member No.: 18,649 |
from the book
QUOTE You have your Decrypt program start working on an encryption to which you have access. Cryptanalysis is an Electronic Warfare + Decrypt (encryption rating x 2, 1 Combat Turn) Extended Test. Which means btw, that SiN info stored on your commlink. You need 10 hits on a decrypt to get access to it. /woo/ |
|
|
Jul 20 2010, 07:16 PM
Post
#10
|
|
Running Target Group: Members Posts: 1,190 Joined: 31-May 09 From: London, UK Member No.: 17,229 |
|
|
|
Jul 20 2010, 07:19 PM
Post
#11
|
|
Prime Runner Group: Members Posts: 3,996 Joined: 1-June 10 Member No.: 18,649 |
From Unwired
pg# 65 QUOTE All encryption has a rating, which is used to determine how difficult it is to break. The higher the rating, the better the encryption. Usually, the rating of the Encrypt program used is the rating of the encryption. Dynamic Encryption: QUOTE The user makes an Opposed Computer + Encrypt Test against the attacker’s Electronic Warfare + Decrypt; for every net hit on this test, the threshold for the attacker’s attempt to break the encryption is increased by one. This requires a Complex Action. Strong encryption lets you up the interval by the amount of time you spent encrypting, max 1 day. I think it's pretty clear that the Encryption rating is = to the Rating of the Encryption program used to encrypt it. |
|
|
Jul 20 2010, 07:25 PM
Post
#12
|
|
panda! Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 |
so a agent performing dynamic encryption, one will continually add to the threshold the attacker is attempting to reach.
i could see that being popular for corps and such, if only they didnt need to spot the attacker first via matrix perception (a mechanic i am unsure how works for automated defenses. Can one spot a hackers persona while he is trying to decrypt some data traffic for instance?). |
|
|
Jul 20 2010, 07:30 PM
Post
#13
|
|
Prime Runner Group: Members Posts: 3,996 Joined: 1-June 10 Member No.: 18,649 |
Only if you make a non-extended matrix perception test, with the threshhold being the Stealth Program Rating.
|
|
|
Jul 20 2010, 07:42 PM
Post
#14
|
|
panda! Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 |
that do still not answer my question, as the person doing the decryption would not be present in any node my persona is present in, but rather in one that the traffic between my home node (comlnk usually) and whatever i am exchanging data with passes through.
from what i can tell there are only two groups of personas i can spot, the ones that are within direct radio range with my comlink (ARO) or those that have a persona present in whatever node(s) i am currently accessing. and given that, i would say the times one can successfully deploy dynamic encryption (or spoof, as it to relies on first using matrix perception on something that can communicate with the target of the spoof action) are more limited then one first get the impression of. seriously, i really like the matrix rules in SR4 for its more flexible nature (and its AR), but the conditions for use on some of its more interesting abilities have apparently not been fully contemplated. |
|
|
Jul 20 2010, 07:45 PM
Post
#15
|
|
Advocatus Diaboli Group: Members Posts: 13,994 Joined: 20-November 07 From: USA Member No.: 14,282 |
I don't really see why you couldn't use Dynamic Encryption wherever you are. You just rotate things, you're not interacting with the decrypter.
|
|
|
Jul 20 2010, 07:52 PM
Post
#16
|
|
panda! Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 |
read the requirements in unwired, its specifies that to use dynamic encryption one first need to use matrix perception successfully on the persona performing the decryption before one can initiate dynamic encryption.
|
|
|
Jul 20 2010, 08:00 PM
Post
#17
|
|
Advocatus Diaboli Group: Members Posts: 13,994 Joined: 20-November 07 From: USA Member No.: 14,282 |
No, no, I don't mean RAW. I mean, 'how you should use it in your game if you want'. (IMG:style_emoticons/default/smile.gif)
|
|
|
Jul 20 2010, 08:10 PM
Post
#18
|
|
panda! Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 |
while true, it kinda defeats the reason to discuss rules in the first place (IMG:style_emoticons/default/wink.gif)
|
|
|
Jul 20 2010, 08:40 PM
Post
#19
|
|
Advocatus Diaboli Group: Members Posts: 13,994 Joined: 20-November 07 From: USA Member No.: 14,282 |
Psh. We constantly discuss RAW and house rules in the same threads here. I thought it was clear that I wasn't making a claim about RAW, but I'm glad someone pointed out that it wasn't. I wouldn't want to confuse anyone.
|
|
|
Jul 20 2010, 10:24 PM
Post
#20
|
|
Moving Target Group: Members Posts: 195 Joined: 31-January 10 Member No.: 18,100 |
The reason why I am asking is because I want to see if using the more complicated encryption (longer intervals) is really game breaking? As I reason it now, I don't think so. I have been trying to make the game faster at the table, but slower in-game because I think it is rediculous that response time is really un important - if they aren't there, then they won't be. You know what I mean?
|
|
|
Jul 20 2010, 10:59 PM
Post
#21
|
|
Running Target Group: Members Posts: 1,228 Joined: 24-July 07 From: Canada Member No.: 12,350 |
|
|
|
Jul 21 2010, 01:39 AM
Post
#22
|
|
Advocatus Diaboli Group: Members Posts: 13,994 Joined: 20-November 07 From: USA Member No.: 14,282 |
Well, that's why there are optional rules. SR4 intentionally has weak crypto, but you can strong it up. (IMG:style_emoticons/default/smile.gif)
|
|
|
Jul 21 2010, 02:39 AM
Post
#23
|
|
Great Dragon Group: Members Posts: 5,537 Joined: 27-August 06 From: Albuquerque NM Member No.: 9,234 |
The reason why I am asking is because I want to see if using the more complicated encryption (longer intervals) is really game breaking? As I reason it now, I don't think so. I have been trying to make the game faster at the table, but slower in-game because I think it is rediculous that response time is really un important - if they aren't there, then they won't be. You know what I mean? My opinion is that the way SR handles encryption is extra dumb, and it clearly shows that which ever dufus wrote and approved the crypto rules has no idea what crypto does and why it needs to be effectively unbreakable for people to do important to the game things like buy stuff with electronic money. The only area where unbreakable decryption really hoses the players is encrypted files. If every file your hacker gets has unbreakable encryption on it really sucks. But since nobody actually carries around a little book full of thousands of random 43 character keys and manually enters the key every time they want to read any file, assume that the OS decrypts the file for the user automatically if the hacker is in as the user. If someone wants to decrypt most anything else I'd suggest any of several other approaches, like Rubber-hose cryptanalysis, black bag jobs, stealing/hacking a poorly secured comlink, etc. All of which are a lot more interesting than the hacker rolling dice until he wins. |
|
|
Jul 21 2010, 04:52 PM
Post
#24
|
|
Moving Target Group: Members Posts: 195 Joined: 31-January 10 Member No.: 18,100 |
This is my idea:
•Harder Encryption: Increased intervals which depend upon the Encryption Rating (ER) and the decrypting System Rating (SR): ER Interval < Half SR 1 Combat Turn > Half SR 1 Minute = RS 5 Minutes > RS 1 Hour |
|
|
Jul 21 2010, 04:52 PM
Post
#25
|
|
Moving Target Group: Members Posts: 195 Joined: 31-January 10 Member No.: 18,100 |
This is my idea:
•Harder Encryption: Increased intervals which depend upon the Encryption Rating (ER) and the decrypting System Rating (SR): ER Interval < Half SR 1 Combat Turn > Half SR 1 Minute = RS 5 Minutes > RS 1 Hour |
|
|
Lo-Fi Version | Time is now: 22nd December 2024 - 10:30 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.