How much random info can a facility generate? |
How much random info can a facility generate? |
Sep 8 2008, 07:14 PM
Post
#1
|
|
Running Target Group: Members Posts: 1,069 Joined: 19-July 07 From: Oakland CA Member No.: 12,309 |
Ok so in 2070 there are two instances i can think of off the top of my head where a facility could greatly benifit from the security of a one-time pad cypher where key distribution is relatively trivial. I was thinking of drones and wage-slaves. Both are tracked and in wire contact meaning that encryption would be good. Both also frequently 'dock' at a physical location where more 'pads' could be uploaded with the maximum security that site can.
So my question is, how much truely (or close enough for a one-time-pad) random data could you generate? Could a black box with a radio active isotope and REALLY good sensors generate appreciable amounts of random data? Could it at least generate enough truly random seeds to generate large pads? Is there there a better method altogether? |
|
|
Sep 8 2008, 07:27 PM
Post
#2
|
|
Dragon Group: Members Posts: 4,664 Joined: 21-September 04 From: Arvada, CO Member No.: 6,686 |
Call it strong encryption and find the rules in unwired.
|
|
|
Sep 8 2008, 08:10 PM
Post
#3
|
|
Great Dragon Group: Members Posts: 5,537 Joined: 27-August 06 From: Albuquerque NM Member No.: 9,234 |
If you want to assume they have invulnerable encryption it's easy to justify that. Random seeds are perfectly possible with hardware using radioactive decay.
|
|
|
Sep 8 2008, 08:23 PM
Post
#4
|
|
Moving Target Group: Members Posts: 133 Joined: 8-September 05 Member No.: 7,718 |
If you want to assume they have invulnerable encryption it's easy to justify that. Random seeds are perfectly possible with hardware using radioactive decay. Under the RAW the only "unbreakable" encryption is that employed by resonance beings (sprites and technomancers) between themselves. It's crackable by other sprites and technos, but normal computers see it as noise. While I understand that one-time pads are "unbreakable" in real life (assuming you have a truly random noise source and your key distribution in not compromised, and you don't make the mistake of re-using a pad), in SR a "new math breakthrough" has rendered ALL encryption weak. If you go the One time pad route then many types of encryption will suddenly become un-crackable. (i.e. the PCs will want it too). If you want to give the NPCs "plot armor" against hacking just say "It's unlike anything you have seen... it seems uncrackable" and leave it at that. Trying to apply real-world Info Tech to Shadowrun... that way lies only madness. P.S. This is based on my experiences. I GM sometimes for a group of Mathematicians I.T. Pros. Better to just make things "magic" then try to explan them. |
|
|
Sep 8 2008, 08:28 PM
Post
#5
|
|
Dragon Group: Members Posts: 4,664 Joined: 21-September 04 From: Arvada, CO Member No.: 6,686 |
|
|
|
Sep 8 2008, 11:33 PM
Post
#6
|
|
Immortal Elf Group: Dumpshocked Posts: 14,358 Joined: 2-December 07 From: Winnipeg, Manitoba, Canada Member No.: 14,465 |
|
|
|
Sep 9 2008, 09:11 AM
Post
#7
|
|
Moving Target Group: Members Posts: 421 Joined: 4-April 08 Member No.: 15,843 |
Could a black box with a radio active isotope and REALLY good sensors generate appreciable amounts of random data? Could it at least generate enough truly random seeds to generate large pads? Is there there a better method altogether? You can get true randomness out of RF white noise, too, I believe. Saves that messing about with radioisotopes: background hiss doesn't have a half-life (IMG:style_emoticons/default/smile.gif) Another method I think uses thermal noise in sensitive microcircuitry. |
|
|
Sep 9 2008, 10:24 AM
Post
#8
|
|
Running Target Group: Members Posts: 1,251 Joined: 11-September 04 From: GA Member No.: 6,651 |
"Dramatic Encryption" is an optional rule in unwired allowing unbreakable encryption.
"Strong Encryption" makes the interval so long its often pointless to stop and decrypt it during a 'run. Of the two Dramatic Encryption seems the best choice for something absurdly difficult. (And I play a TM most times so yes, I believe there are things a TM shouldnt be capable of decrypting) |
|
|
Sep 9 2008, 10:34 AM
Post
#9
|
|
Runner Group: Members Posts: 3,009 Joined: 25-September 06 From: Paris, France Member No.: 9,466 |
Please stop with this "OTP are the ultimate encryption method!".
OTP are good. They also have vulnerabilities even if these aren't that problematic. But the biggest issue is that they aren't very practical to use. If there were, there would be used everywhere already! First you have to store the keys somewhere, and even if you manage to send the key without any risk of interception, the storage itself can probably be compromised one way or another. There's also the problem of the non-reuse: if you don't know which devices you'll connect to and how many connections you'll need to do, how do you know which pad to use for your next connection, and how do you know it hasn't been used yet? Even when you do know which device you'll connect to and how many connections you'll make, it's very easy for an attacker to invalidate all your OTP in a few seconds, leaving you with no pad left. |
|
|
Sep 9 2008, 12:07 PM
Post
#10
|
|
Runner Group: Members Posts: 2,598 Joined: 15-March 03 From: Hong Kong Member No.: 4,253 |
The problem is not that OTP don't have their problems, but that all other encryption in SR is complete and utter crap. If you had good non-OTP encryption in SR, then people would use that instead, but there isn't so the OTP keeps comming up, since the OTP are not breakable. They have implementation difficulties, but when they are the only effective method of encryption available to you; you just grit your teeth and put up with the problems (and everyone becomes very good at implementing OTP systems).
[Edit] It's kinda like playing in a Highlander game. The only way to kill another immortal is to cut of his head. Sure cutting off his head is kinda hard to but, it's the only way to get the job done. And after hundreds of years, everyone is pretty good at cutting someones head off. [/edit] |
|
|
Sep 9 2008, 12:23 PM
Post
#11
|
|
Runner Group: Members Posts: 3,009 Joined: 25-September 06 From: Paris, France Member No.: 9,466 |
Yes but the point is that it's not just "implementation difficulties": they are just impossible to implement in most common cases!
To me, they would just be a possible explanation for "Dramatic Encryption", which are rare and only come up in special situations. |
|
|
Sep 9 2008, 02:55 PM
Post
#12
|
|
Dragon Group: Members Posts: 4,664 Joined: 21-September 04 From: Arvada, CO Member No.: 6,686 |
|
|
|
Lo-Fi Version | Time is now: 9th November 2024 - 12:32 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.