IPB

Welcome Guest ( Log In | Register )

2 Pages V   1 2 >  
Reply to this topicStart new topic
> Encryption: How does it work?
Eyeless Blond
post Apr 8 2004, 05:31 AM
Post #1


Decker on the Threshold
******

Group: Dumpshocked
Posts: 2,922
Joined: 14-March 04
Member No.: 6,156



So far I've seen at least four different rules for ways to encrypt and decrypt things, starting with the rather useless one on sr3 p.292-293 to the much harder to crach--and, paradoxically, lighter and cheaper--units used in R3. Which ones can you use for which situations, and what's the best, in general, to use for keping runners in contact with each other?
Go to the top of the page
 
+Quote Post
Frag-o Delux
post Apr 8 2004, 05:41 AM
Post #2


Running Target
***

Group: Members
Posts: 1,213
Joined: 10-March 02
From: Back from the abyss.
Member No.: 2,316



The ones in SR3 are for normal comm gear, the ones in R3 are for networks. They are not compatible. Well I am pretty sure they are not, we just had a discussion about them in the rigger thread.
Go to the top of the page
 
+Quote Post
mfb
post Apr 8 2004, 08:32 AM
Post #3


Immortal Elf
**********

Group: Members
Posts: 11,410
Joined: 1-October 03
From: Pittsburgh
Member No.: 5,670



i love how the entire concept of networking apparently got lost in the crash. i should have one of my characters start a major corporate war by inventing the goddamn token ring.

SR's encryption rules are completely spastic. the only possible way to partially explain it is that someone found a mathematical shortcut that allows you to solve incredibly complex equations involving prime numbers a couple million times more quickly than today's math can (this is theoretically possible; there's a pair of twins in the UK--i think it's the UK--that spend their spare time trading insanely large prime numbers; obviously, some sort of shortcut to generating such large primes exists). even then, it should be a relatively simple matter to just generate higher levels of encryption, and make such a shortcut obsolete.

furthermore, there's absolutely no reason why something that decrypts rigger network encryption should be unable to decrypt regular radio traffic--it's all the same goddamn thing. rigger networks simply transmit a lot more data.

with that rant out of the way, your best bet is probably figuring out a way to run it through the rigger's RCD.
Go to the top of the page
 
+Quote Post
Moon-Hawk
post Apr 8 2004, 03:11 PM
Post #4


Genuine Artificial Intelligence
********

Group: Members
Posts: 4,019
Joined: 12-June 03
Member No.: 4,715



QUOTE (mfb)
SR's encryption rules are completely spastic. the only possible way to partially explain it is that someone found a mathematical shortcut that allows you to solve incredibly complex equations involving prime numbers a couple million times more quickly than today's math can

What's that rule? Our computing speed approximately doubles every year, and has for several years? Actually, I heard recently that our rate was increasing, up to more like every nine months, but for now let's assume we keep the current trend and double every year, like we have been doing for the last few decades. So 60 years, that's 2^60, or about a million, million, million times faster. (quintillion, for those keeping track) So, even if computing is a trillion times slower than projections indicate, they still do what you suggest.
Remember, even the first-gen cyberdecks were beyond supercomputers by our standards, the 6th-gen ones make those look like pong.
Go to the top of the page
 
+Quote Post
CardboardArmor
post Apr 8 2004, 03:21 PM
Post #5


Moving Target
**

Group: Members
Posts: 264
Joined: 26-March 04
From: Houston
Member No.: 6,197



QUOTE (mfb)
furthermore, there's absolutely no reason why something that decrypts rigger network encryption should be unable to decrypt regular radio traffic--it's all the same goddamn thing. rigger networks simply transmit a lot more data.

I'd argue with this. It's the same reason why your wiz-bang CD drive won't play DVD's. Encryption and compression methods, data formats, all sorts of transmission factors come into play. Granted, the carrier signal might be the same (and hence subject to jamming), but decryption would be a no-joy.
Go to the top of the page
 
+Quote Post
Lilt
post Apr 8 2004, 03:35 PM
Post #6


Shooting Target
****

Group: Members
Posts: 1,965
Joined: 26-February 02
From: Edinburgh, Scotland
Member No.: 2,032



Actually encryption isn't all that hard to break, you just need to use something as powerful as the human brain. I once heard that if you convert data encrypted with RSA encryption into sound (I don't think it was a direct wav translation) then a trained expert can figure-out the prime numbers involved in some ridiculously small period of time (15 minutes or something) just working by ear.

Of-course this is hearsay and I've never done it myself.
Go to the top of the page
 
+Quote Post
John Campbell
post Apr 8 2004, 06:51 PM
Post #7


Running Target
***

Group: Members
Posts: 1,028
Joined: 9-November 02
From: The Republic of Vermont
Member No.: 3,581



QUOTE (Moon-Hawk)
What's that rule?  Our computing speed approximately doubles every year, and has for several years?  Actually, I heard recently that our rate was increasing, up to more like every nine months, but for now let's assume we keep the current trend and double every year, like we have been doing for the last few decades.  So 60 years, that's 2^60, or about a million, million, million times faster.  (quintillion, for those keeping track) So, even if computing is a trillion times slower than projections indicate, they still do what you suggest.


Except that any advance in computing power can also be applied to the encrypting. And encryption is easier than decryption. Massively easier. Linear increases in keysizes result in geometric increases in cracking difficulty. Switching from a 64-bit key to a 65-bit key will double the power required to crack the encryption in a given amount of time, with a trivial increase in power required for the encryption. Switching from a 64-bit key to a 128-bit key will make the encryption 2^64 times harder to crack. That'll swallow up all your hypothesized increase in computing power, and then some. And the best part... you won't even notice the difference in encryption times, even with a modern CPU.

distributed.net cracked RC5-64, using a distributed effort from hundreds of thousands of computers all over the globe. It took us five years. (And that only decrypted that data; it didn't break the algorithm. If we want to crack another instance of RC5-64-encrypted data, we have to do it all again.) If we assume that Moore's Law holds out for the next 60 years (it can't... Heisenburg will kick our butts long before then), a similar 2064 effort to break RC5-128 would take eighty years. And RC5-128 encryption can be performed on the fly almost invisibly by modern machines. Imagine the kind of encryption that machines 2^60 times faster can use...

You have to assume a qualitative improvement in decryption methods. Simply assuming a quantitative improvement in the amount of processing power you can throw at the problem puts you on the losing end of the battle.
Go to the top of the page
 
+Quote Post
Moon-Hawk
post Apr 8 2004, 06:58 PM
Post #8


Genuine Artificial Intelligence
********

Group: Members
Posts: 4,019
Joined: 12-June 03
Member No.: 4,715



I know, I'm on distributed.net.
My point was that increasing processing power is obviously not the solution since SR processing power is extremely increased and yet...y'know what? Nevermind. I've read my post, and my point was extremely poorly made. From the looks of it, I forgot my point halfway through writing it. I fold.
Go to the top of the page
 
+Quote Post
bahwi
post Apr 8 2004, 07:01 PM
Post #9


Target
*

Group: Members
Posts: 40
Joined: 3-December 02
Member No.: 3,676



Remember, a lot of the comm gear as well as other gear has the encryption routines and the DRM built into the device. Buying something with decryption IMO is a hacked-up version of a radio or whatever, and then it only sometimes will work if it can break the key. A lot of this stuff is built in, not just software based as it is now in our time. (And yes, DRM is coming, and hard-wired encryption is too, and when it is here and too complex for people to make in their spare time ---> SEE DishTV and DirectTV, you have to copy a H card or other type of card to pirate it, or get it legally. No one has yet re-created this software wise, even though it is broadcast all over the US and SkyTV(I think) is broadcast all over england and beyond!). So that is an idea of what is to come. Yes, the encryption and decryption rules are simplified for game play, but I think that applying todays concepts of software encryption would be incorrect as well. Use the coming soon to your motherboard, in your IPOD, Otis, and other MP3 players, etc.. DRM and the DishTV/DirectTV hardware-based card encryption that no one has cracked via software yet(AFAIK) to plot out more advanced rules if you think they are necessary.

If you do, post a link and PM it to me cuz I wouldn't mind them. It just isn't as big a concept in my game (yet) as it is for most others.

Go to the top of the page
 
+Quote Post
Eyeless Blond
post Apr 8 2004, 07:42 PM
Post #10


Decker on the Threshold
******

Group: Dumpshocked
Posts: 2,922
Joined: 14-March 04
Member No.: 6,156



The real problem is that a well-designed encryption algorithm isn't balanced in-game, so you have to figure out something that *is* balanced and work with that, much like the rules for all of decking. As you guys have said, currently on the market are many free or very cheap encryption methods that are impossible to break by anything short of either exponentially more computing power or a complicated man-in-the-middle attack, which pretty much means that the spy has no chance of decrypting something that an encrypter really sets his mind to hiding. In addition, there is a certain type of encryption called a one-time pad that is provably unbreakable, with the complication that the secret key must be at least the same size as the data being transmitted.

On the flip side, I expect that quantum computing will become viable in personal systems by then (thus the reason programs and processors alike are encoded on optical chips), and that pretty much changes all the known rules of what is calulable in polynomial time. There are already mathematicians working on writing programs for this kind of computer, and the results are frankly amazing. I've heard one grad student wrote a program that can factor a number in polynomial time, which would basically make all current reasonable forms of encryption obsolete.
Go to the top of the page
 
+Quote Post
Moon-Hawk
post Apr 8 2004, 07:48 PM
Post #11


Genuine Artificial Intelligence
********

Group: Members
Posts: 4,019
Joined: 12-June 03
Member No.: 4,715



QUOTE (Eyeless Blond)
In addition, there is a certain type of encryption called a one-time pad that is provably unbreakable, with the complication that the secret key must be at least the same size as the data being transmitted.

So you can feely distribute the encrypted file with no worries, you only have to keep track of the key.
But...If the key is just as big as the original file, why not just keep track of the original?

p.s. This is a joke. I DO see the potential for increased security (needing both files), if anyone tries to explain it to me I've got a carp here with your name on it. :P
Go to the top of the page
 
+Quote Post
mfb
post Apr 8 2004, 11:08 PM
Post #12


Immortal Elf
**********

Group: Members
Posts: 11,410
Joined: 1-October 03
From: Pittsburgh
Member No.: 5,670



cardboard, i'd possibly allow that a regular radio network can't handle/decrypt a rigger network. however, a rigger network ought to be able to handle/decrypt a radio network, much the same way that a DVD player can play CDs.
Go to the top of the page
 
+Quote Post
John Campbell
post Apr 8 2004, 11:08 PM
Post #13


Running Target
***

Group: Members
Posts: 1,028
Joined: 9-November 02
From: The Republic of Vermont
Member No.: 3,581



We've discussed one-time pads here before on a couple of occasions, and generally seem to end up with opinions split between those that believe that introducing theoretically unbreakable encryption into Shadowrun would break the game, and those (including myself) that believe that the limitations within which OTPs have to be used to actually be unbreakable are sufficient to keep them from breaking the game, and, if used realistically, can actually add to the game by requiring more interesting methods of attack on certain bits of data than just having the decker spend ten minutes with a Decrypt program.
Go to the top of the page
 
+Quote Post
mfb
post Apr 8 2004, 11:11 PM
Post #14


Immortal Elf
**********

Group: Members
Posts: 11,410
Joined: 1-October 03
From: Pittsburgh
Member No.: 5,670



on quantum computing: i honestly don't see that happening, in SR. if it did, every VR system would be ultraviolet-rated, and the most powerful systems around would be about the size of your hand. implanted computers--smartlinks, tactical comps, etc.--would cost about 0.01 essence. quantum computing is disturbingly powerful.
Go to the top of the page
 
+Quote Post
gknoy
post Apr 8 2004, 11:38 PM
Post #15


Moving Target
**

Group: Members
Posts: 413
Joined: 20-November 03
Member No.: 5,835



QUOTE (mfb)
on quantum computing: i honestly don't see that happening, in SR. if it did, every VR system would be ultraviolet-rated, and the most powerful systems around would be about the size of your hand.

BTW, most of the powerful systems ARE small. Cyberdecks are like the size of a bible or small dictionary, IIRC. ;)

How hard is it to simulate quantum computing? ie, without a real quantum computer? This is all pretty unlikely (as I imagine that emulating QC is pretty Hard as computing tasks go), but perhaps the SR tools use emulated quantum computing, and therefore the different ratings of encryption/decryption simply reflect a more robust and optimized emulation?

probalby not. Honestly, I think I agree totally that the encryption rules are completely knackered, and made a total sacrifice of real-worl-believability for game-world-balanceability.

That said, snooping encrypted communications or data STREAMS could be more possible -- poorly implemented encrypters could have a lot of redundant data, etc, or known plaintext portions, which would make cracking the data significantly easier in a data-analysis sense. Or they might have a [known?] weakness in their random key generators, or things like that. Maybe then the different rating decrypt software isn't reallt about true encryption-cracking, but about data-analysis to find keys and thereby uncover the data. Kindof like how l0pht-crack can pwn windows passwords, lol.

That said, it should be extremely fast and easy to encrypt something of nearly arbitrary strength, given the computing and media-processing power of the matrix (think of the massive parallell processing and transfer abilities needed for a sculpted host, for example), and still take a Long Time to crack.

I'd be interested in seeing how well decking would work if we fiddled the encryption-related rules to be more realistic. =) I like John Campbell's point -- it might make it harder to do thins the Current Way, but it could potentially open all sorts of other doors in terms of story options. On-site access would be more important, and legwork to find existing legit users of the system (to snoop their communications or swipe their hardware) would probably become more prominent.

Of course, this makes Otaku all the more powerful, I imagine, in that some of them are probably certainly encryption savants ;)

QUOTE
implanted computers--smartlinks, tactical comps, etc.--would cost about 0.01 essence. quantum computing is disturbingly powerful.

Ah, but essense cost is not solely about Size, but about the degree of invasiveness for its' connections to the body. I bet that cranial cyberdecks are not simply a reduced size deck crammed into your skull, but uses portions of your wetware to aid in processing/connectivity.
Go to the top of the page
 
+Quote Post
mfb
post Apr 9 2004, 01:50 AM
Post #16


Immortal Elf
**********

Group: Members
Posts: 11,410
Joined: 1-October 03
From: Pittsburgh
Member No.: 5,670



theoretically, it's possible to simulate any computing system with any other computing system. you could emulate a Cray with an abacus--which is about the comparison between modern computing and quantum computing. something that a quantum computer could calculate in seconds, a bank of our most powerful supercomputers would spend years on, if not decades or even millennia.

there ought to be a specialization of Computers and Electronics called Cryptography. acts as a complementary skill to crypto stuff.
Go to the top of the page
 
+Quote Post
gknoy
post Apr 9 2004, 06:46 AM
Post #17


Moving Target
**

Group: Members
Posts: 413
Joined: 20-November 03
Member No.: 5,835



QUOTE (mfb)
you could emulate a Cray with an abacus--which is about the comparison between modern computing and quantum computing.


there ought to be a specialization of Computers and Electronics called Cryptography. acts as a complementary skill to crypto stuff.

Yeah, I figured the emulation was pretty infeasible. :)

re: encryption:
I considered it less Computers, and more a Knowledge skill. Why? Because cryptanalysis is much more about heavy theoretical mathematics than it is about computing. That's why the NSA is (I hear) the largest employer of mathematics majors. :)
Go to the top of the page
 
+Quote Post
nezumi
post Apr 9 2004, 01:49 PM
Post #18


Incertum est quo loco te mors expectet;
*********

Group: Dumpshocked
Posts: 6,546
Joined: 24-October 03
From: DeeCee, U.S.
Member No.: 5,760



Here's a thought (based off of the one mentioned earlier)...

Unlike now, no one offers their "free" encryption protocols. You have to pay to get a black box of DES or what not, everything is carefully kept black box and carefully guarded. The corps realize how valuable data is and all that. So the rating 4+ encryption algorithms, despite being pretty basic (and perhaps a level 8 is just two level 4's tied together), is sold at an unnaturally high price. Level 3 and below are those made by random people who aren't quite as sure what they're doing, and do have more vulnerabilities/are more simplistic. The decryption algorithms then is your data search. It identifies the algorithm (this is usually stated in the handshake to begin with, so its not secret), then searches for known vulnerabilities.
Go to the top of the page
 
+Quote Post
Wireknight
post Apr 9 2004, 06:30 PM
Post #19


Moving Target
**

Group: Members
Posts: 527
Joined: 26-February 02
Member No.: 1,118



The only real problem with this is the fact that there are two(three, if we subdivide the first) sources of encryption technology. The first is private individuals(freelancers/open-sourcers and corporations being a good subdivision to make), the second is where the aforementioned likely came from, i.e. the halls of academia.

Encryption algorithms developed as part of theoretical mathematics research would be published in journals. Individuals who wrote encryption would likely be willing to release their cryptographic protocols publically and for free(see PGP). No one releasing anything they develop, in the future, is like saying people won't ever program or develop theories, except under the direct supervision and oversight of a corporation.

If there are no independent algorithmic thinkers and actors in the future, it makes Shadowrun a pretty boring place to be a technophile.
Go to the top of the page
 
+Quote Post
hobgoblin
post Apr 9 2004, 06:47 PM
Post #20


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



unless your on a corps payrole. the problem with any type of encryption is that its a gamebreaker for the pure techie most often, it basicly makes all your hard work useless unless you can get hold of the key. and getting the key is a effort in physical detective work more often then computer work, therefor breaking with one of the pillars of classical cyberpunk (i know neuromancer was written by someone that didnt know what a computer was or how it worked). if you want a more realistic look at computer security then take a look at blue planet.
Go to the top of the page
 
+Quote Post
gknoy
post Apr 9 2004, 07:36 PM
Post #21


Moving Target
**

Group: Members
Posts: 413
Joined: 20-November 03
Member No.: 5,835



Except, the world of encryption is the opposite of the resty of the world, when it comes to wanting secrecy. Secret algorithms are almost always weaker. The only way algorithms can be proven to be secure is by peer review, and cryptanalysis by many others. (Many people WANT secret algprithms, and there are a lot out there, but there's no proof that they are any good.)

I could make up my own algorithm right now, and call it CrytoTwiddle, and market it as usable for the latest secure communications protocol; but I am not omniscient enough (indeed, NO ONE is) to know that it is secure on all fronts: key management, transfer, generation, is there any repeated plaintext or anything that makes an implementation of an algorithm weaker? These are the sorts of questions that cryptanalysts look at, in addition to the math behind the base algorithm.

Even a corporate-sponsored research lab, I believe, would have a hard time coming up with an encryption method that was secure enough. "Security through obscurity" simply means that no one knows how it's done -- and thus can't duplicate / break it; however, this is totally insecure: there is no such thing as real security through obscurity. Once any person knows how it works, and publishes (such as to Shadowlands), you're screwed. :)

I imagine that the largest communities of encryption experts are actually active on Shadowlands, or perhaps in a think-tank sponsored by many corporations (and employing MANY researchers - like a conglomerate multi-lab :)). It's the only way to get the sort of peer review needed to ensure that somethign is _secure_, as opposed to "not broken YET".

This post has been edited by gknoy: Apr 9 2004, 07:37 PM
Go to the top of the page
 
+Quote Post
Rev
post Apr 9 2004, 07:43 PM
Post #22


Moving Target
**

Group: Members
Posts: 675
Joined: 26-February 02
From: Seattle
Member No.: 2,034



Heh yea that is sort of funny, the idea that encryption would be game breaking because decking would be impossible. Isn't it nice to know that computer hacking in the real world is impossible because of encryption? :spin:

It would just be a bit different, and there would probably be more RP and on site stealing needed for a decker to get anything done. Maybe the rest of the team's job would just be to hook the deckers dongle onto a computer inside the corp hq and get a pass phrase from some employee. The matrix combat stuff already has absolutely no attatchment to any conceivable reality, so nothing about it needs to change unless you want to make the system realistic (meaning pretty much requiring an obsessive personality due to the slow tedium of it and making most of it a technical procedure rather than a combat one).

A few, imho really irritating, elements would be gone from the game. Encrypted radio com would be easy and unbreakable. No more drone control contests. You could still do electronic warfare to disrupt communication, but you would not be able to take over another persons drone with a simple die roll.
Go to the top of the page
 
+Quote Post
hobgoblin
post Apr 10 2004, 02:16 AM
Post #23


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



heh, takeing over a drone with a simple die roll. thats the player talking, not the char. the char would be fakeing signal packages so that the drone thinks its talking to the boss when told to to redo the handshake routine and hook up to a new datastream.

i find the idea of unbreakable encryption more irritating then the ability to listen in on radio traffic or takeing over control of a drone. if someone can take over control of a drone then so can the original owner. if the runners can get into the radio traffic of the secuirty then so can the security do to the runners. anything in sr is a doubleedge sword. sure unbreakable encryption makes the game easyer for the gm but it allso makes it less fun for the players as it removes ways for them to avoid being railroaded by the gm.
Go to the top of the page
 
+Quote Post
mfb
post Apr 10 2004, 03:28 AM
Post #24


Immortal Elf
**********

Group: Members
Posts: 11,410
Joined: 1-October 03
From: Pittsburgh
Member No.: 5,670



well, yes, unbreakable encryption does limit the players' options--but if it hadn't been offered as an option in the first place, no one would complain. nobody complains about gravity, either.
Go to the top of the page
 
+Quote Post
hobgoblin
post Apr 11 2004, 12:45 AM
Post #25


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



LOL :)
thats one way to look at it :)
Go to the top of the page
 
+Quote Post

2 Pages V   1 2 >
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 19th April 2024 - 11:46 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.