![]() |
![]() ![]() |
![]() |
![]()
Post
#51
|
|
Prime Runner Ascendant ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 17,568 Joined: 26-March 09 From: Aurora, Colorado Member No.: 17,022 ![]() |
Except for Dynamic Encryption which.. does exactly that.. sorta. Sort of... but it is different, because you cannot keep Dynamically encrypting in my opinion. You get your roll to increase the threshold. Eventually, your Hacker WILL gain access... the benefits to Dynamic Encryption is that it increases the time that it takes the Hacker to gain access (Because you already know someone is attempting to penetrate your system), thus providing the system with the time to bring other security measures to its defense. Besides, Dynamic Encryption is not compatible with Strong Encryption, which is my preferred method (Along with Dramatic Encryption when appropriate, Page 66, Unwired) of securing a system. Even with a 1 Minute, Strong Encryption method, you have effectively stymied your hacker... increasing the interval much beyond the Minute range effectively removes Hacking-on-site as a viable alternative (relegating it to the Decking Schemes of earlier editions) unless you have employed some form of Social Networking to obtain a valid passcode into the system. |
|
|
![]()
Post
#52
|
|
Moving Target ![]() ![]() Group: Members Posts: 424 Joined: 9-July 10 From: Voice with an Matrix Connection Member No.: 18,806 ![]() |
You cannot change encryption every round and have that matter. What you are describing is no different than a time-varying cipher, as Alice and Bob must still have some way to knowing which encryption is being used for the next time window. They are either using a 1-time pad, which is unbreakable (by SR rules), but requires a database on either side that was synced up ahead of time, or using a pattern to generate the next cipher. Adding a single layer of time dynamism on top of a time-varying cipher doesn't really matter.
QUOTE ("The FAQ") Isn't encryption in SR4A too weak? Even the strongest encryption doesn't take a hacker with a decent Decrypt program very long to break. Real-world encryption comes in basic two varieties: unbreakable encryption that is somewhat time-consuming to create and implement (one-time pads) and pseudorandom ciphers and encryption schemes that aren't completely unbreakable but can implemented really fast with computers. One-time pads still exist in Shadowrun but the relative difficulty of generating and using them correctly precludes their general use, so the opposing forces of encryption and decryption focus on developing more sophisticated algorithms and analysis techniques. Currently in SR4A, decryption is winning. A further analysis of encryption and some optional rules for harder encryption can be found on pp. 65-67, Unwired. The book fails to mention it. |
|
|
![]()
Post
#53
|
|
Advocatus Diaboli ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 13,994 Joined: 20-November 07 From: USA Member No.: 14,282 ![]() |
Um, what?
|
|
|
![]()
Post
#54
|
|
Prime Runner Ascendant ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 17,568 Joined: 26-March 09 From: Aurora, Colorado Member No.: 17,022 ![]() |
|
|
|
![]()
Post
#55
|
|
Target ![]() Group: Members Posts: 49 Joined: 12-February 10 Member No.: 18,149 ![]() |
Yeah, I've seen mention of 1 time pads in other threads about encryption, and I understand their RL application. But I have yet to see SR rules on them, at least in SR4(A).
|
|
|
![]()
Post
#56
|
|
Advocatus Diaboli ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 13,994 Joined: 20-November 07 From: USA Member No.: 14,282 ![]() |
I'm not sure, but maybe Simon is (foolishly) talking about reality, instead of the game. In the game, you have Strong, Dramatic, and Dynamic Encryption options, and they function exactly as stipulated in the rules. (IMG:style_emoticons/default/smile.gif) 'Makes sense' or 'works that way' don't enter into it.
|
|
|
![]()
Post
#57
|
|
Target ![]() Group: Members Posts: 49 Joined: 12-February 10 Member No.: 18,149 ![]() |
"They are either using a 1-time pad, which is unbreakable (by SR rules)"
Well, he says by SR rules, so it seems he believes there is some sort of game reference. |
|
|
![]()
Post
#58
|
|
Moving Target ![]() ![]() Group: Members Posts: 424 Joined: 9-July 10 From: Voice with an Matrix Connection Member No.: 18,806 ![]() |
It's a game rule if you accept that the FAQ counts as cannon. And if you are willing to take the phrase "One-time pads still exist in Shadowrun but the relative difficulty of generating and using them correctly precludes their general use" to mean that you can make a 1 time pad.
Or was the confusing bit my statement on cryptography? Alice, Bob, and Eve are the names of three interests used in crypto theory to illustrate concepts. Usually Alice and Bob are talking and Eve is trying to listen in on the conversation. The time-varying cipher is a crypto system where the two people communicating, Alice and Bob, continually switch through different ciphers for different blocks of communication. Decryption then becomes a game of guessing the pattern they are using to switch between ciphers, and then break those ciphers. This is exactly what the Enigma Code was based on. |
|
|
![]()
Post
#59
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,899 Joined: 29-October 09 From: Leiden, the Netherlands Member No.: 17,814 ![]() |
You can't re-encrypt something that is encrypted (At least in Shadowrun anyways), which is where they are coming from. Not that big of a deal, really... (IMG:style_emoticons/default/wobble.gif) It IS rather silly. Encryption shouldn't care about the data to be encrypted; why should it matter if you're encrypting encrypted data? Also, why can't you just drop encryption scheme 1 and go on with 2? If it's possible to encrypt something while it's running, it should also be possible to disengage encryption again. (I have trouble with encrypting a running node. That seems dubious.) |
|
|
![]()
Post
#60
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,251 Joined: 11-September 04 From: GA Member No.: 6,651 ![]() |
Cryptosense modules can impose a -1 penalty on decryption for what thats worth. they are bypassed using a reality filter but can hinder the reality filter from loading perhaps also at -1.
|
|
|
![]()
Post
#61
|
|
Advocatus Diaboli ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 13,994 Joined: 20-November 07 From: USA Member No.: 14,282 ![]() |
No, I just didn't understand *why* you were saying what you were saying. (IMG:style_emoticons/default/smile.gif) I got to the end and went, 'Um, what?'. (IMG:style_emoticons/default/biggrin.gif) Whether or not the FAQ is 'cannon', a fluff phrase about how one-time pads *aren't* used doesn't mean that they exist in the rules, that's all.
|
|
|
![]()
Post
#62
|
|
Prime Runner ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 3,996 Joined: 1-June 10 Member No.: 18,649 ![]() |
It IS rather silly. Encryption shouldn't care about the data to be encrypted; why should it matter if you're encrypting encrypted data? Also, why can't you just drop encryption scheme 1 and go on with 2? If it's possible to encrypt something while it's running, it should also be possible to disengage encryption again. (I have trouble with encrypting a running node. That seems dubious.) True Crypt will encrypt a running node.. sorta, and that's today's technology. But it takes a while, and really all it's encrypting is the data written to storage. Everything else in the system is not encrypted. Including what's written to memory. But then again we're doing that whole real life thing. I'm okay with the idea that encrypting a whole node is part of the boot up process and takes a while. |
|
|
![]()
Post
#63
|
|
Moving Target ![]() ![]() Group: Members Posts: 424 Joined: 9-July 10 From: Voice with an Matrix Connection Member No.: 18,806 ![]() |
No, I just didn't understand *why* you were saying what you were saying. (IMG:style_emoticons/default/smile.gif) I got to the end and went, 'Um, what?'. (IMG:style_emoticons/default/biggrin.gif) Whether or not the FAQ is 'cannon', a fluff phrase about how one-time pads *aren't* used doesn't mean that they exist in the rules, that's all. Aren't used, but exist. But I get kicked in the head by my GM regularly for trying to push arguments like that, so I guess I'm outvoted by the boot. |
|
|
![]()
Post
#64
|
|
Target ![]() Group: Members Posts: 49 Joined: 12-February 10 Member No.: 18,149 ![]() |
Cannon or not, a single line in fluff does not equate to "unbreakable (by SR rules)"
There are, in fact, NO SR rules for 1 time pads, if this is the only reference. |
|
|
![]()
Post
#65
|
|
Moving Target ![]() ![]() Group: Members Posts: 424 Joined: 9-July 10 From: Voice with an Matrix Connection Member No.: 18,806 ![]() |
|
|
|
![]()
Post
#66
|
|
Prime Runner Ascendant ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 17,568 Joined: 26-March 09 From: Aurora, Colorado Member No.: 17,022 ![]() |
It's a game rule if you accept that the FAQ counts as cannon. And if you are willing to take the phrase "One-time pads still exist in Shadowrun but the relative difficulty of generating and using them correctly precludes their general use" to mean that you can make a 1 time pad. Or was the confusing bit my statement on cryptography? Alice, Bob, and Eve are the names of three interests used in crypto theory to illustrate concepts. Usually Alice and Bob are talking and Eve is trying to listen in on the conversation. The time-varying cipher is a crypto system where the two people communicating, Alice and Bob, continually switch through different ciphers for different blocks of communication. Decryption then becomes a game of guessing the pattern they are using to switch between ciphers, and then break those ciphers. This is exactly what the Enigma Code was based on. I believe that what you are trying to reference is the rules for Dramatic Encryption... they are in Unwired... |
|
|
![]()
Post
#67
|
|
Advocatus Diaboli ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 13,994 Joined: 20-November 07 From: USA Member No.: 14,282 ![]() |
Totally; Dramatic Encryption covers that very nicely. (IMG:style_emoticons/default/smile.gif)
|
|
|
![]()
Post
#68
|
|
Target ![]() Group: Members Posts: 49 Joined: 12-February 10 Member No.: 18,149 ![]() |
|
|
|
![]()
Post
#69
|
|
Prime Runner ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 3,996 Joined: 1-June 10 Member No.: 18,649 ![]() |
Totally; Dramatic Encryption covers that very nicely. (IMG:style_emoticons/default/smile.gif) Didn't I mention that t the beginning of this page (IMG:style_emoticons/default/smile.gif) Sheesh |
|
|
![]() ![]() |
![]() |
Lo-Fi Version | Time is now: 21st May 2025 - 09:19 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.