IPB

Welcome Guest ( Log In | Register )

3 Pages V   1 2 3 >  
Reply to this topicStart new topic
> Encryption too weak ?, Broken
Serbitar
post Sep 18 2005, 01:20 PM
Post #1


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



QUOTE (SR4)

Make a Decrypt + Response
(Encryption rating x 2, 1 Combat Turn) Extended Test to break
the encryption.


Assuming the encryption rating is the rating of the encryption programm (there is no "encryption action" as stated on page 256) the hardest encryption would be 6.

Even if you use the house rule that allows only "skill" rolls in an extended test, the treshold of 2*6=12 can be cracked by a 12 year old.
If you have 5 decrypt, 4 response you get to roll 9*5 = 45 dice, that get you 13 hits on average.

If you dont use the house rule, but the optional rule that allows "dice" rolls you only need a combination of response and decrypt that adds up to 7. giving you 7*7=49 dice for an average of 14.33 hits.

If you dont restrict extended tests at all your 1 response 1 decrypt script kiddie is hacking your beefy rating 6 encryption in 18 combat turns which is about one minute.

Did I overlook something?
Go to the top of the page
 
+Quote Post
Crusher Bob
post Sep 18 2005, 01:31 PM
Post #2


Runner
******

Group: Members
Posts: 2,598
Joined: 15-March 03
From: Hong Kong
Member No.: 4,253



change to rating^2? or maybe 2^rating? The base time could use some fixing as well...

rating^2 gives the following difficulties:

1..1 (3 dice needed)
2..4 (12 dice needed)
3..9 (27 dice needed)
4..16 (48 dice needed)
5..25 (75 dice needed)
6..36 (108 dice needed)

2^Rating gives to following difficulties:
1..2 (6 dice)
2..4 (12 dice)
3..8 (24 dice)
4..16 (48 dice)
5..32 (96 dice)
6..64 (192 dice)

assuming program rating 6 (easy to get, relatively cheap)
and the following skill ratings, limiting rolls to skill rating, here are the total dice rolled:

skill 1: 7 dice (7x1)
skill 2: 16 dice (8x2)
skill 3: 27 dice (9x3)
skill 4: 40 dice (10x4)
skill 5: 55 dice (11x5)
skill 6: 72 dice (12x6)

This lets someone will skill 6 crack rating 5 encryption almost all of the time using the first system (in ~18 seconds) and need plenty of luck to crack rating 5 encryption using the second system...

Of course the elapsed times are too fast as well.



Go to the top of the page
 
+Quote Post
Serbitar
post Sep 18 2005, 01:44 PM
Post #3


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



In my example above, the rating of "decrypt" would be the "skill" rating "response" would qualify as the attribute. It is funny that neither encrypt nor decrypt use the "electronic warfare" skill, although the utility is linked to the skill.

I would change this "decrypt + response" into "decrypt + electronic warfare" for streamlining. Response is always in the equation as it is constraining utility ratings . . .

rating^2 sounds reasonable. A base timr of "enc rating" combat turns might be ok.
Go to the top of the page
 
+Quote Post
Crusher Bob
post Sep 18 2005, 01:57 PM
Post #4


Runner
******

Group: Members
Posts: 2,598
Joined: 15-March 03
From: Hong Kong
Member No.: 4,253



another possibility is to make the retest times for decryption very long, so that many things can be decrypted, if you don't mind waiting for a few hundred years... Of course this makes good encryption esentailly unbeatable, and since runners will almost always be going against people with good encryption this will remove the 'ability' to decrpyt whatever they want. Thankfully this is not 'game breaking' as both social engineering and the rubber hose method of decryption will usually have good odds of breaking the encryption.
Go to the top of the page
 
+Quote Post
Rotbart van Dain...
post Sep 18 2005, 02:15 PM
Post #5


Hoppelhäschen 5000
*********

Group: Members
Posts: 5,807
Joined: 3-January 04
Member No.: 5,951



QUOTE (Crusher Bob)
Of course this makes good encryption esentailly unbeatable, and since runners will almost always be going against people with good encryption this will remove the 'ability' to decrpyt whatever they want.

Which just destroys the character concept of a hacker - back to square one.

In SR3 it took unplayable amounts of time, gear and karma to defeat broadcast encryption, while it took only a Simple action and a halfway decent Program to defeat any matrix encryption.

The method of changing * to ^ while leaving everything else the same would be the least invasive one, too.
Go to the top of the page
 
+Quote Post
Magnus Jakobsson
post Sep 19 2005, 01:40 PM
Post #6


Target
*

Group: Members
Posts: 15
Joined: 20-August 05
Member No.: 7,576



To me, too many dice rolls to accomplish a single thing seems boring. I would keep the system as it is, and limit the number of rolls to 4. That's not even changing the rules - the amount of rolls is supposed to be the GM's decision. Rolls = Dice Pool is only a suggestion (see page 58).

Assuming you got the best decryption program possible for you (that is, equal to your Response rating), you would on average be able to break encryptions one level higher than your program. Here's the table:

Decryption (and Response) 1 = 2,6 hits (beats Encryption 1)
2 = 5,3 hits (beats Encryption 2)
3 = 8 hits (beats Encryption 4)
4 = 10,6 hits (beats Encryption 5)
5 = 13,3 hits (beats Encryption 6)
6 = 16 hits (beats Encryption 8 )

If you want better encryption, a smoother curve and faster gameplay, you could limit the number of rolls to 3. Then you can't even count on beating encryptions of the same rating as your decryption program. Sounds to harsh for me, but here's the table:

Decryption (and Response) 1 = 2 hits (beats Encryption 1)
2 = 4 hits (beats Encryption 2)
3 = 6 hits (beats Encryption 3)
4 = 8 hits (beats Encryption 4)
5 = 10 hits (beats Encryption 5)
6 = 12 hits (beats Encryption 6)

Allso, The Electronic Warfare Specialization "Encryption" has got to be the most worthless Specialization in the book...
Go to the top of the page
 
+Quote Post
Rotbart van Dain...
post Sep 19 2005, 01:55 PM
Post #7


Hoppelhäschen 5000
*********

Group: Members
Posts: 5,807
Joined: 3-January 04
Member No.: 5,951



Until Unwired, possibly.
Go to the top of the page
 
+Quote Post
Lebo77
post Sep 22 2005, 07:57 PM
Post #8


Moving Target
**

Group: Members
Posts: 133
Joined: 8-September 05
Member No.: 7,718



The poor effectiveness of encryption could be due to advances in P vs. NP problems. The ability to solve NP -hard problems in polynomial time would make decryption of most modern schemes trivial given the massive computer power availible to 2070 electronics.

Assuming Moore's law continues to hold, the computing power availible come 2070 will be about 9x10^12th (or 2^43rd) times as powerfull as what is availible now. With a highly efficient prime number sive, public-key encryption would be easy to crack.
Go to the top of the page
 
+Quote Post
Chandon
post Sep 23 2005, 12:15 AM
Post #9


Moving Target
**

Group: Members
Posts: 261
Joined: 26-February 02
From: Massachusetts
Member No.: 2,115



Lebo77:
It's true that math advances could make cracking public key encryption much easier. On the other hand, private key cryptography couldn't be broken so easily unless there have been developments that give everyone infinate processing power (such as some of the dream predictions for quantum computing). Even with infinate processing power, it's still possible to make unbreakable crypto by ensuring that multiple keys can decrypt the file to different valid plaintexts.

In the context of Shadowrun, breakable encryption might make things more fun (although having to hack into where the key is stored can be fun too).

A rule like "If the rating of your encryption program doesn't exceed the rating of the encryption, the extended test interval is 1 hour." might be interesting.
Go to the top of the page
 
+Quote Post
Crusher Bob
post Sep 23 2005, 10:36 AM
Post #10


Runner
******

Group: Members
Posts: 2,598
Joined: 15-March 03
From: Hong Kong
Member No.: 4,253



Well, you do lose the 'story mechanic' of 'needing X time' to decrypt the file. It either happens in seconds or not at all. Also it makes sitting down and breakingthe encryption preferable to any number of schemes to obtain the encryption key.

Personally, I'd prefer to keep encyrption 'hard' as more of the party is likely to be involved in 'key theft' that just the hacker.

Go to the top of the page
 
+Quote Post
hades
post Sep 23 2005, 01:01 PM
Post #11


Target
*

Group: Members
Posts: 10
Joined: 21-September 05
Member No.: 7,768



QUOTE (Lebo77)
The poor effectiveness of encryption could be due to advances in P vs. NP problems.  The ability to solve NP -hard problems in polynomial time would make decryption of most modern schemes trivial given the massive computer power availible to 2070 electronics.

Effectiveness of future encryption schemes is not a matter of computational power, it's a matter of concept. Whatever the progression of computational power in the future may be, one thing is for sure: if there exist encryption schemes that are widely believed to be secure (even by Megacorps, governments, etc.), then Joe Average Streetpunk won't have the knowledge of breaking them. That is the very essence of encryption.

But then again, considering it is a game world, one can make of it whatever he wants.

Btw: hello board. :)
Go to the top of the page
 
+Quote Post
Crusher Bob
post Sep 23 2005, 01:33 PM
Post #12


Runner
******

Group: Members
Posts: 2,598
Joined: 15-March 03
From: Hong Kong
Member No.: 4,253



In general, secure encryption algorytms are public. It's just that there are no efficient ways to break them, so it dosen't matter if you know someone is using xyz encryption angorythm, you can't wait for the universe to grow cold to find out what was said.

Usings Moore's law, some quick google results, and a bit of guessing, a PGP message encrypted with a 1024 bit ket would take a pretty good 2070 desktop ~ 9 minutes to crack. A PGP message encrypted with a 2048 bit key would take roughly 17,000 years to crack. This is, of course, assuming no 'improved' attacks against PGP are found in the intervening time.

(For a bit of fun, this is assuming that a 2070 desktop computer can do a about ~9E20 useful operations per second.)

So, the short version is that encryption that is 'pretty good' today could still possible give headaches to our great grandchildren...
Go to the top of the page
 
+Quote Post
hades
post Sep 23 2005, 01:36 PM
Post #13


Target
*

Group: Members
Posts: 10
Joined: 21-September 05
Member No.: 7,768



QUOTE (Crusher Bob)
So, the short version is that encryption that is 'pretty good' today could still possible give headaches to our great grandchildren...

And i doubt that today's encryption schemes will be anywhere near the sota encryption schemes of 2070.
Go to the top of the page
 
+Quote Post
Crusher Bob
post Sep 23 2005, 01:42 PM
Post #14


Runner
******

Group: Members
Posts: 2,598
Joined: 15-March 03
From: Hong Kong
Member No.: 4,253



This, of course, assumes that no polynomial time algorithm exists for finding large prime factors exists. If such an algorithm were discovered, most, if not all, of current encryption schemes (barring one time pads) would become crap almost overnight.
Go to the top of the page
 
+Quote Post
Shadow_Prophet
post Sep 23 2005, 01:45 PM
Post #15


Moving Target
**

Group: Members
Posts: 445
Joined: 18-August 05
Member No.: 7,567



QUOTE (Crusher Bob)
In general, secure encryption algorytms are public. It's just that there are no efficient ways to break them, so it dosen't matter if you know someone is using xyz encryption angorythm, you can't wait for the universe to grow cold to find out what was said.

Usings Moore's law, some quick google results, and a bit of guessing, a PGP message encrypted with a 1024 bit ket would take a pretty good 2070 desktop ~ 9 minutes to crack. A PGP message encrypted with a 2048 bit key would take roughly 17,000 years to crack. This is, of course, assuming no 'improved' attacks against PGP are found in the intervening time.

(For a bit of fun, this is assuming that a 2070 desktop computer can do a about ~9E20 useful operations per second.)

So, the short version is that encryption that is 'pretty good' today could still possible give headaches to our great grandchildren...

Yes thats why the worlds best encryption algorithm out there today was cracked by hackers in 3 days the second time they tried. The first time was a couple of months. And that was encryption that was supposed to take years upon years to crack. Hackers are far more ingenious at figuring out ways for breaking encryption than you give them credit for.
Go to the top of the page
 
+Quote Post
hades
post Sep 23 2005, 01:51 PM
Post #16


Target
*

Group: Members
Posts: 10
Joined: 21-September 05
Member No.: 7,768



QUOTE (Crusher Bob)
This, of course, assumes that no polynomial time algorithm exists for finding large prime factors exists.

Nope. It assumes that future encryption is unlikely to be based on the hardness of factoring therefore it doesn't matter if such an algorithm exists.
Go to the top of the page
 
+Quote Post
Crusher Bob
post Sep 23 2005, 02:02 PM
Post #17


Runner
******

Group: Members
Posts: 2,598
Joined: 15-March 03
From: Hong Kong
Member No.: 4,253



I was making no comment about future encryption schemes. It was an addendum to my post about cracking PGP. In that the difficulty of cracking PGP lies in finding large prime factors of numbers. This current algorithms to do this take 'super' polynomial time, this is why PGP would take so long to crack using current algorithms.

Go to the top of the page
 
+Quote Post
warrior_allanon
post Sep 23 2005, 02:11 PM
Post #18


Moving Target
**

Group: Members
Posts: 775
Joined: 31-March 05
From: florida
Member No.: 7,273



stupid question, and it only applies to text encryption, but what would the result be if you ran each leter through a letter number interface filtering the sequence through 5 dead languages and one non-sensical language, would that make it harder to crack you think
Go to the top of the page
 
+Quote Post
Vaevictis
post Sep 23 2005, 02:13 PM
Post #19


Moving Target
**

Group: Members
Posts: 530
Joined: 11-June 05
Member No.: 7,441



QUOTE (Shadow_Prophet)
Yes thats why the worlds best encryption algorithm out there today was cracked by hackers in 3 days the second time they tried. The first time was a couple of months.

Got some reference for that? A link?
Go to the top of the page
 
+Quote Post
Shadow_Prophet
post Sep 23 2005, 02:22 PM
Post #20


Moving Target
**

Group: Members
Posts: 445
Joined: 18-August 05
Member No.: 7,567



QUOTE (Vaevictis @ Sep 23 2005, 09:13 AM)
QUOTE (Shadow_Prophet @ Sep 23 2005, 08:45 AM)
Yes thats why the worlds best encryption algorithm out there today was cracked by hackers in 3 days the second time they tried.  The first time was a couple of months.

Got some reference for that? A link?

sure let me go dig it up and I'll edit here and post it.

EDIT: Atm having trouble tracking down the article on it though I'm still working on it. I will give relate what I remember just incase someone else picks up on it and can help me find the thing faster. Essentialy there was a contest(?) to see if the encryption was breakable to prove that it was unbreakable. Bunch of hackers got together, and essentialy created a distributed network using the unused cycles of the CPU's. First time they beat the encryption in a matter of 2-3 months I think, and then they tried a second time enlarging their network and beat it in a matter of days. Anyways back to searching!
Go to the top of the page
 
+Quote Post
Crusher Bob
post Sep 23 2005, 03:20 PM
Post #21


Runner
******

Group: Members
Posts: 2,598
Joined: 15-March 03
From: Hong Kong
Member No.: 4,253



Maybe your are refering to a breaking of RSA-129 in 1994?

Linky
Go to the top of the page
 
+Quote Post
Shadow_Prophet
post Sep 23 2005, 03:22 PM
Post #22


Moving Target
**

Group: Members
Posts: 445
Joined: 18-August 05
Member No.: 7,567



QUOTE (Crusher Bob)
Maybe your are refering to a breaking of RSA-129 in 1994?

Linky

Quite possibly. I had thought something like that was done alot more recently. I could very well be wrong here so I apologize if I've got my dates confused and such and am infact completely wrong.
Go to the top of the page
 
+Quote Post
Crusher Bob
post Sep 23 2005, 03:37 PM
Post #23


Runner
******

Group: Members
Posts: 2,598
Joined: 15-March 03
From: Hong Kong
Member No.: 4,253



There's also the cracking of DES in ~1999.

Linky
Go to the top of the page
 
+Quote Post
NightRain
post Sep 23 2005, 03:38 PM
Post #24


Moving Target
**

Group: Members
Posts: 268
Joined: 26-February 02
From: Brisbane, Australia
Member No.: 78



More likely you're talking about distributed.net and their breaking of either RC5 or DES II

http://encyclopedia.thefreedictionary.com/...Distributed.net
Go to the top of the page
 
+Quote Post
Vaevictis
post Sep 23 2005, 05:28 PM
Post #25


Moving Target
**

Group: Members
Posts: 530
Joined: 11-June 05
Member No.: 7,441



He can't possibly be referring to any of those based on his statement of the "best encryption algorithm out there today."

DES-56 was considered near obsolete by most experts by the time I learned about it in 1995. At that point in time, they were basically saying don't use it -- it could fall apart at any time.

RSA-129 is not relevant; modern public key systems are suggested to use a minimum of 1024 bits, which is a number that is 308 digits in length. People these days often go for a 2048 bit key, which is a truly obscene number.

DES-II was just DES-64, iirc. Not even close to SOTA at the point it happened.

As far as cracking encryption goes, given current methods and the rate of improvement of technology and methods, modern day encryption generally provides "good enough" protection for encrypted data for about 20 years after the introduction of the technology. Often times, simply increasing the bitsize of the key can increase the lifetime of the method.

Remember, each bit size increases the keyspace by twice as much as the previous bit. The original DES used a 56 bit key, basically a 16 digit number. DES-64 was a 19 digit number. Modern symmetric key systems use at least 128 bits -- a 38 digit number. That's a huge difference in keyspace sizes.

That's why I was suprised by his statement that someone broke SOTA encryption in a matter of days. If that was the case, they either got lucky and it was a unique incident (that can happen on brute forces, it's just very unlikely), or someone proved P=NP or invented a practical quantum computer or something like that. If that's the case, that is *crazy* stuff.
Go to the top of the page
 
+Quote Post

3 Pages V   1 2 3 >
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 14th February 2025 - 05:37 AM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.