Encryption, can someone point me to the rules on this? |
Encryption, can someone point me to the rules on this? |
Jul 21 2010, 04:52 PM
Post
#26
|
|
Moving Target Group: Members Posts: 195 Joined: 31-January 10 Member No.: 18,100 |
This is my idea:
Harder Encryption: Increased intervals which depend upon the Encryption Rating (ER) and the decrypting System Rating (SR): ER vs. Interval ER< Half SR = 1 Combat Turn ER> Half SR = 1 Minute ER= SR = 5 Minutes ER> SR = 1 Hour Conversely, the system rating could be the decrypt program rating instead. I think that might be better. |
|
|
Jul 21 2010, 05:19 PM
Post
#27
|
|
panda! Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 |
and thats different in practice from unwired's strong encryption, how exactly?
|
|
|
Jul 21 2010, 05:42 PM
Post
#28
|
|
Prime Runner Group: Members Posts: 3,996 Joined: 1-June 10 Member No.: 18,649 |
and thats different in practice from unwired's strong encryption, how exactly? Strong encryption says: Time Spent Encrypting = Interval for Decrypting (Max 24 hours) example: I spend a day encrypting file X using a Rating 5 Encryption program. (like say SiN information) Hacker Bob grabs the files and decides to try and decrypt it. Hacker Bob rolls an extended test using his computer+decrypt dice pool (including cyber, bio, optimization bonuses) Threshhold: 10 Interval: 1 day if I spend 6 hours encrypting file Y then it becomes: Threshhold:10 Interval: 6 hours. The rating of the decryption program has no bearing on the threshhold or interval. Hacker Bob has 18 dice roughly In the first example it takes him: 2 days to decrypt the file In the Second example it takes him: 12 hours If he gets lucky, or spends edge, he can easily get it in one go. Strong encryption can only be done on Files and possibly Nodes, but never on Signals. |
|
|
Jul 21 2010, 05:45 PM
Post
#29
|
|
Advocatus Diaboli Group: Members Posts: 13,994 Joined: 20-November 07 From: USA Member No.: 14,282 |
I might even want to tweak Strong Encryption to the defender's favor a little more. Maybe (2*Time Spent)=Decrypt Interval? Anyway, whatever is fun for your game. You can even use them together, weak and strong.
|
|
|
Jul 21 2010, 06:02 PM
Post
#30
|
|
Prime Runner Group: Members Posts: 3,996 Joined: 1-June 10 Member No.: 18,649 |
I was thinking it's an interesting way of getting hackers into the meat, and doing more social hacking.
Most real nodes, are strong encrypted. To hack in from the outside, first you have to break the encryption wrapper. So, lets say you want to get into Bank of Fragal's network via their matrix portal. 1) hacking+decrypt(or computer+decrypt) against their Encryption*2 with an interval of day. 2) hacking+exploit 3) entry allowed. Once you're in you have an account and the node is on the fly decrypting for you using the key. So unless there are sections or files that are specifically encrypted with a different key. You're all set. Lets say you don't have two weeks to decrypt and then slow hack your way in. You use social engineering. 1) you find a sysadmin or security spider who works from home and you obtain his commlink and direct hack it, or hold a gun to his head while he gives you his encryption keys/access tokens. 2) You get inside the building, and access the node directly. Allow hackers do to things like: use hardware+decrypt to build a decrypting gadget that someone just has to plug into a terminal/local commlink/nexus. A logic+hardware to modify someone's commlink to store and send images of everything that passes through it to a secondary node. Basically allow hackers to build little gadgets to give them the ability to get around such problems, but that require being in the meat. Hacker infiltrates a building, and finds a nice wire/junction area to setup in. He taps some matrix fiber, the electrical grid, attaches a gadget into the elevator junction box. Attaches a gadget to the video feed. Voila, he's in. Give him a giant bonus for taking stuff over in the building, or say that the gadget lowers the threshhold or intervals. Depending. This means that wide spread, I hack from home, is rare, and slow. Only the very best do it, and it takes them /weeks/ to get into certain places. Shadowrunner Hackers specialize in: Overwatch, In the Meat data infiltrations, and the like. |
|
|
Jul 21 2010, 06:07 PM
Post
#31
|
|
Advocatus Diaboli Group: Members Posts: 13,994 Joined: 20-November 07 From: USA Member No.: 14,282 |
Ditto. Social engineering is a fun element.
|
|
|
Lo-Fi Version | Time is now: 22nd December 2024 - 10:15 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.