IPB

Welcome Guest ( Log In | Register )

2 Pages V  < 1 2  
Reply to this topicStart new topic
> Encryption, can someone point me to the rules on this?
Rand
post Jul 21 2010, 04:52 PM
Post #26


Moving Target
**

Group: Members
Posts: 195
Joined: 31-January 10
Member No.: 18,100



This is my idea:

Harder Encryption: Increased intervals which depend upon the Encryption Rating (ER) and the decrypting System Rating (SR):
ER vs. Interval
ER< Half SR = 1 Combat Turn
ER> Half SR = 1 Minute
ER= SR = 5 Minutes
ER> SR = 1 Hour

Conversely, the system rating could be the decrypt program rating instead. I think that might be better.
Go to the top of the page
 
+Quote Post
hobgoblin
post Jul 21 2010, 05:19 PM
Post #27


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



and thats different in practice from unwired's strong encryption, how exactly?
Go to the top of the page
 
+Quote Post
sabs
post Jul 21 2010, 05:42 PM
Post #28


Prime Runner
*******

Group: Members
Posts: 3,996
Joined: 1-June 10
Member No.: 18,649



QUOTE (hobgoblin @ Jul 21 2010, 05:19 PM) *
and thats different in practice from unwired's strong encryption, how exactly?


Strong encryption says:

Time Spent Encrypting = Interval for Decrypting (Max 24 hours)

example:
I spend a day encrypting file X using a Rating 5 Encryption program. (like say SiN information)
Hacker Bob grabs the files and decides to try and decrypt it.
Hacker Bob rolls an extended test using his computer+decrypt dice pool (including cyber, bio, optimization bonuses)
Threshhold: 10
Interval: 1 day

if I spend 6 hours encrypting file Y then it becomes:
Threshhold:10
Interval: 6 hours.
The rating of the decryption program has no bearing on the threshhold or interval.

Hacker Bob has 18 dice roughly
In the first example it takes him: 2 days to decrypt the file
In the Second example it takes him: 12 hours
If he gets lucky, or spends edge, he can easily get it in one go.

Strong encryption can only be done on Files and possibly Nodes, but never on Signals.
Go to the top of the page
 
+Quote Post
Yerameyahu
post Jul 21 2010, 05:45 PM
Post #29


Advocatus Diaboli
**********

Group: Members
Posts: 13,994
Joined: 20-November 07
From: USA
Member No.: 14,282



I might even want to tweak Strong Encryption to the defender's favor a little more. Maybe (2*Time Spent)=Decrypt Interval? Anyway, whatever is fun for your game. You can even use them together, weak and strong.
Go to the top of the page
 
+Quote Post
sabs
post Jul 21 2010, 06:02 PM
Post #30


Prime Runner
*******

Group: Members
Posts: 3,996
Joined: 1-June 10
Member No.: 18,649



I was thinking it's an interesting way of getting hackers into the meat, and doing more social hacking.

Most real nodes, are strong encrypted.

To hack in from the outside, first you have to break the encryption wrapper.

So, lets say you want to get into Bank of Fragal's network via their matrix portal.

1) hacking+decrypt(or computer+decrypt) against their Encryption*2 with an interval of day.
2) hacking+exploit
3) entry allowed.

Once you're in you have an account and the node is on the fly decrypting for you using the key. So unless there are sections or files that are specifically encrypted with a different key. You're all set.

Lets say you don't have two weeks to decrypt and then slow hack your way in.
You use social engineering.
1) you find a sysadmin or security spider who works from home and you obtain his commlink and direct hack it, or hold a gun to his head while he gives you his encryption keys/access tokens.
2) You get inside the building, and access the node directly.

Allow hackers do to things like:
use hardware+decrypt to build a decrypting gadget that someone just has to plug into a terminal/local commlink/nexus.
A logic+hardware to modify someone's commlink to store and send images of everything that passes through it to a secondary node.
Basically allow hackers to build little gadgets to give them the ability to get around such problems, but that require being in the meat.

Hacker infiltrates a building, and finds a nice wire/junction area to setup in. He taps some matrix fiber, the electrical grid, attaches a gadget into the elevator junction box. Attaches a gadget to the video feed. Voila, he's in. Give him a giant bonus for taking stuff over in the building, or say that the gadget lowers the threshhold or intervals. Depending.

This means that wide spread, I hack from home, is rare, and slow. Only the very best do it, and it takes them /weeks/ to get into certain places.
Shadowrunner Hackers specialize in: Overwatch, In the Meat data infiltrations, and the like.

Go to the top of the page
 
+Quote Post
Yerameyahu
post Jul 21 2010, 06:07 PM
Post #31


Advocatus Diaboli
**********

Group: Members
Posts: 13,994
Joined: 20-November 07
From: USA
Member No.: 14,282



Ditto. Social engineering is a fun element.
Go to the top of the page
 
+Quote Post

2 Pages V  < 1 2
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 22nd December 2024 - 10:15 AM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.