Help - Search - Members - Calendar
Full Version: Fixxing Unbreakable Encryption
Dumpshock Forums > Discussion > Shadowrun
Pages: 1, 2
Heath Robinson
CODE
case 1:
    Bob encrypts his connection to Alice
    Eve initiates decryption on the Bob-Alice connection
    Bob drops the encryption removing Eve's progress
    Goto case 1


The problem here is, by it's very nature, down to the fact that a particular instance of the Encryption is cracked. Dropping the instance and replacing it resets all progress made. Cycling periodically renders nodes impossible to crack.

A solution is to change the Decrypt action to target the node itself instead of the encryption instance (but the action requires a visible instance of encryption that involves that node to work). Hits are maintained between attempts to decrypt different instances created by the node and once a particular instance has been cracked you have the keys for all encryption that node performs until an arbirary date in the future when sufficient new entropy for a fresh master key has been generated.


Quick, dirty, reasonable solution imo. Requesting Comment.
Darkeus
Don't you have to intercept the wireless traffic before you can decrypt anything in that example. That requires a roll in itself. Plus I think a Matrix perception test to even find the wireless signal your looking for.

Otherwise, encryption works on a game level. It just isn't realistic.. That is okay though. I think your adding some complexity there.
Blade
Or you could consider that it's a given that the Encrypt program is already using such things as periodic cycling and that the decrypt program is somehow able to get around that. Which is more or less the same thing.
BlueMax
QUOTE (Heath Robinson @ Jun 2 2009, 07:46 AM) *
CODE
case 1:
    Bob encrypts his connection to Alice
    Eve initiates decryption on the Bob-Alice connection
    Bob drops the encryption removing Eve's progress
    Goto case 1


The problem here is, by it's very nature, down to the fact that a particular instance of the Encryption is cracked. Dropping the instance and replacing it resets all progress made. Cycling periodically renders nodes impossible to crack.

A solution is to change the Decrypt action to target the node itself instead of the encryption instance (but the action requires a visible instance of encryption that involves that node to work). Hits are maintained between attempts to decrypt different instances created by the node and once a particular instance has been cracked you have the keys for all encryption that node performs until an arbirary date in the future when sufficient new entropy for a fresh master key has been generated.


Quick, dirty, reasonable solution imo. Requesting Comment.


Err, I don't know how Shadowrun encryption handshakes are completed from either a rules or a pathetic attempt at realism perspective. However, your approach appears something akin to Rotating Key XOR, which would just be a type of encryption. The depth and variance of encryption methods is handled by the rating, and thus Decrypting Bob's line is just one action.

BlueMax
BlueMax
QUOTE (Blade @ Jun 2 2009, 08:14 AM) *
Or you could consider that it's a given that the Encrypt program is already using such things as periodic cycling and that the decrypt program is somehow able to get around that. Which is more or less the same thing.

Beat me by that much!
Draco18s
QUOTE (Darkeus @ Jun 2 2009, 11:12 AM) *
Don't you have to intercept the wireless traffic before you can decrypt anything in that example.


Other way around by RAW. You have to decrypt it before you can intercept it.

Yes. It doesn't make any RW sense.
Darkeus
QUOTE (Draco18s @ Jun 2 2009, 12:48 PM) *
Other way around by RAW. You have to decrypt it before you can intercept it.

Yes. It doesn't make any RW sense.


My bad, you are right. Thanks for clearing that up, I was quoting from memory..

No, that makes no sense. Yet, I can see why they do things from a game perspective but logic wise..
Malachi
QUOTE (Heath Robinson @ Jun 2 2009, 09:46 AM) *
    case 1:
    Bob encrypts his connection to Alice
    Eve initiates decryption on the Bob-Alice connection
    Bob drops the encryption removing Eve's progress
    Goto case 1

I think you're missing something(s) here. First, dropping the encryption on a connection certainly would "removing Eve's progress" in a way, but she would automatically succeed at that point. Now, if you're talking about a situation where Bob is "cycling" the Encryption to Alice, then you're missing some rules from Unwired regarding changing the Encryption on a connection:
QUOTE (Unwired p. 66, Decrypt Action)
Signals encryption may be restored by closing the subscription
(a Log Off action), re-establishing the subscription (a Log On
action), and then re-encrypting the subscription (a Simple Action
from each side of the link).

So, to do what you're talking about would require:
  1. Bob encrypts his connection to Alice
  2. Eve initiates decryption of the Bob-Alice connection
  3. Bob drops his connection to Alice
  4. Bob re-connects to Alice
  5. Goto top

Is this more secure? Sure. Is it annoying for the parties that constantly have to disconnect and re-connect? Absolutely. Incidentally, the same section of Unwired states that if the Encryption is on an entire Node, then the Node must be rebooted before Encryption can be changed. Is this realistic? No, but it is balanced from a game perspective.
Heath Robinson
QUOTE (BlueMax @ Jun 2 2009, 05:27 PM) *
Err, I don't know how Shadowrun encryption handshakes are completed from either a rules or a pathetic attempt at realism perspective. However, your approach appears something akin to Rotating Key XOR, which would just be a type of encryption. The depth and variance of encryption methods is handled by the rating, and thus Decrypting Bob's line is just one action.

Eh? No, I just assume that bob has a master key store that gets reused across encryption instances. For example, bob has one set of keys which he uses all the time. The more times Eve sees him use keys out that store the more progress she can make towards deriving the master key and rendering all his further encryption attempts ineffective.

QUOTE (Blade @ Jun 2 2009, 05:14 PM) *
Or you could consider that it's a given that the Encrypt program is already using such things as periodic cycling and that the decrypt program is somehow able to get around that. Which is more or less the same thing.

Yes. It's more or less the same thing. However, you're presenting a bag-o'-rats clause. That's worse than just redesigning cryptanalysis.

QUOTE (Malachi @ Jun 2 2009, 10:08 PM) *
I think you're missing something(s) here. First, dropping the encryption on a connection certainly would "removing Eve's progress" in a way, but she would automatically succeed at that point. Now, if you're talking about a situation where Bob is "cycling" the Encryption to Alice, then you're missing some rules from Unwired regarding changing the Encryption on a connection:

You must surely understand why I would miss that out, or intentionally block it from my memory. That rule's beyond belief. This is the true evil of bag-o'-ratsing. It's not that I really blame the devs - not wanting to change existing rules is a virtu... Wait one damn moment!
Malachi
QUOTE (Heath Robinson @ Jun 2 2009, 03:29 PM) *
You must surely understand why I would miss that out, or intentionally block it from my memory. That rule's beyond belief. This is the true evil of bag-o'-ratsing. It's not that I really blame the devs - not wanting to change existing rules is a virtu... Wait one damn moment!

*shrug* Rules in games are made for game-mechanics reasons all the time. Your OP states that the situation is "broken," and the rule from Unwired certainly mitigates the "break." Thus, one accepts the way that it is for pure game mechanics reasons and moves on. Even FrankTrollman's alternate Matrix rules, which seem to be written primarily as a platform for him to complain about encryption, take fantastic liberties with the laws of electricity and physics for the sake of favourable game mechanics. That's ok. It's a game.
Heath Robinson
Mmm, but Frank's stuff at least states outright that it's taking fantastic liberties. The problem with the Matrix is that normal people are now familiar with something analogous to what it claims to emulate. To the point where they start going "oh, I know X" and then the rules turn around and say "oh, no, you don't". That's where the rage comes from - when you know things and the rules go off and actually contradict those things without making it sufficiently clear that the game isn't even trying to emulate the real world.

The Matrix should seriously be wordfiltered into nonsense terms for the sake of not misleading everybody.
BlueMax
QUOTE (Heath Robinson @ Jun 2 2009, 02:04 PM) *
The Matrix should seriously be wordfiltered into nonsense terms for the sake of not misleading everybody.

This I can strongly agree with and back. If they had not tried to "real-iffy" the matrix, the information would have been easier to assimilate. Right now its a big ol heap of namespace collision.

I want my Megapulses!

BlueMax
Malachi
QUOTE (Heath Robinson @ Jun 2 2009, 04:04 PM) *
Mmm, but Frank's stuff at least states outright that it's taking fantastic liberties.

Except for the part where he goes on for pages about why encryption can't be hacked. That's what bothers me the most about Frank's rules. He goes on for blah blah blah about encryption, using technology capabilities from right now as his basis for argument, and then later gives Hackers the ability to affect circuitry that is OFF, at a range of Line of Sight, by manipulating the very electrons that may or may not be present in it, at the quantum level ("or something").... but faster decryption is way beyond suspension of disbelief... oh well.
Heath Robinson
Frank's mostly talking about OTPs. These are cryptographically unbreakable. Not "it would take you until the sun eats us" unbreakable. I mean that they are unbreakable without knowing the key (which can be huge). There exist no attacks on an OTP. With all the data recording and storage in 2070 it's not implausible that OTPs are actually in far more widespread usage than today. It's easy to step outside and take a recording of traffic noise then apply an app to it to get pure entropy, then use that entropy to render your data unbreakable until you have the key.


And if you can get LOS to the device that contains the key then you can just extract the key and use it.
Malachi
QUOTE (Heath Robinson @ Jun 2 2009, 04:55 PM) *
Frank's mostly talking about OTPs. These are cryptographically unbreakable. Not "it would take you until the sun eats us" unbreakable. I mean that they are unbreakable without knowing the key (which can be huge). There exist no attacks on an OTP. With all the data recording and storage in 2070 it's not implausible that OTPs are actually in far more widespread usage than today. It's easy to step outside and take a recording of traffic noise then apply an app to it to get pure entropy, then use that entropy to render your data unbreakable until you have the key.


And if you can get LOS to the device that contains the key then you can just extract the key and use it.

I know what Frank was talking about. I read his pages and pages of blah blah. There exists no current attacks on OTP encryption. However, the RAW in Unwired provide alternate methods that could simulate OTP's: "Strong Encryption." What I find hypocritical/hard to swallow are the rules talking about affecting circuitry that is off by simply bombarding EM radiation at it (wireless signals) powering up the circuit at a range of line of sight and then affecting the circuit at the molecular level to re-route electrons to get the circuit to do what you want. Those rules describe a world where the mind/machine meld is such to the point where signal processing is capable of all of the above, but we don't have good enough math to decrypt signals.

I know there are no current methods for cracking OTPs... but also currently can't power my cell phone by holding it in line-of-sight of a cell phone tower.
Fix-it
QUOTE (Heath Robinson @ Jun 2 2009, 09:46 AM) *
CODE
case 1:
    Bob encrypts his connection to Alice
    Eve initiates decryption on the Bob-Alice connection
    Bob drops the encryption removing Eve's progress
    Goto case 1


The problem here is, by it's very nature, down to the fact that a particular instance of the Encryption is cracked. Dropping the instance and replacing it resets all progress made. Cycling periodically renders nodes impossible to crack.

A solution is to change the Decrypt action to target the node itself instead of the encryption instance (but the action requires a visible instance of encryption that involves that node to work). Hits are maintained between attempts to decrypt different instances created by the node and once a particular instance has been cracked you have the keys for all encryption that node performs until an arbirary date in the future when sufficient new entropy for a fresh master key has been generated.


Quick, dirty, reasonable solution imo. Requesting Comment.


so basically, instead of trying to break the actual encryption, you're running side channel attacks. not a bad idea.
BlueMax
All of that was about tech and crypto today. We need a flag for Fantasy Science and one for Real Science. And maybe a "I read Schneier's webpage so I must know crypto!" flag.

Also, no need to wait for 2070 for a key manager. A hardware and several POS software Key Managers are already available. There was a little outfit in Redwood City that made an amazing Key Manager.

Shadowrun computing is running on different mathematical paradigms. They cannot be explained because they are ahead (or to the side) of us.

BlueMax
/as for my TRNG, I prefer temp flux
Heath Robinson
QUOTE (Malachi @ Jun 3 2009, 12:05 AM) *
I know what Frank was talking about. I read his pages and pages of blah blah. There exists no current attacks on OTP encryption.

I know there are no current methods for cracking OTPs... but also currently can't power my cell phone by holding it in line-of-sight of a cell phone tower.

There exist no theoretically possible attacks on OTP encryption. It just can't exist. There's no reuse of any bit of entropy - every bit of the plaintext is combined with an independant phenomena such that you can't pry things apart at all. It's a mathematically impossibility. You can't even guess because keysizes are ridiculous (making the chance of getting it right pretty much 0) and there are millions of keys that lead to data that is valid but utterly, utterly wrong.

There is no attack on OTP because you've taken 2 sources of entropy and you've come out with only as much entropy as was in the larger source. You can only transform it back into the smaller source of entropy by knowing the bigger source of entropy and subtracting it out. It's fucking impossible by Information Theory to crack it. It's unrealistic to posit any kind of attack and doing so renders your argument for the verisimilitude of the setting null, void, and insane.

In terms of something closer to home: Bitwise XOR. Actually used for some OTP implementations. A XOR B = 6. Can you tell me what A or B are? This is an actual OTP. A trivial case admittedly, but there's nothing in the universe that can tell you what A or B are from just the "ciphertext" without knowing it's complement.


We've got cellphones so small that they're difficult to actually push the buttons on. We still haven't put plumbers out of their jobs. I still don't have my jetpack, or flying car. There are no rayguns. No Mars mission. No monolith. No AI.
The Jake
Isn't this why Unwired explicitly states all crypto is crackable? That sidebar allows for GMs to introduce uncrackable crypto as a special plot hook.

You have to assume the rules cover the process or you go mad.

Who is to say that computational speeds and heuristic analysis can't determine patterns in algorithm and key selection? Also for an eavesdropping attacker able to intercept the key exchange, things change dramatically.

Suspension of disbelief people. smile.gif

- J.
Cthulhudreams
Shadowrun 4th ed has wireless power transmission by the way, Microwave power sats where first deployed in like 2006. The technology may have come along in the intervening 64 years.
Tymeaus Jalynsfein
QUOTE (Darkeus @ Jun 2 2009, 11:42 AM) *
My bad, you are right. Thanks for clearing that up, I was quoting from memory..

No, that makes no sense. Yet, I can see why they do things from a game perspective but logic wise..



But you still must detect the traffic before you can decrypt it...
Tymeaus Jalynsfein
QUOTE (Heath Robinson @ Jun 2 2009, 04:44 PM) *
There exist no theoretically possible attacks on OTP encryption. It just can't exist. There's no reuse of any bit of entropy - every bit of the plaintext is combined with an independant phenomena such that you can't pry things apart at all. It's a mathematically impossibility. You can't even guess because keysizes are ridiculous (making the chance of getting it right pretty much 0) and there are millions of keys that lead to data that is valid but utterly, utterly wrong.

There is no attack on OTP because you've taken 2 sources of entropy and you've come out with only as much entropy as was in the larger source. You can only transform it back into the smaller source of entropy by knowing the bigger source of entropy and subtracting it out. It's fucking impossible by Information Theory to crack it. It's unrealistic to posit any kind of attack and doing so renders your argument for the verisimilitude of the setting null, void, and insane.

In terms of something closer to home: Bitwise XOR. Actually used for some OTP implementations. A XOR B = 6. Can you tell me what A or B are? This is an actual OTP. A trivial case admittedly, but there's nothing in the universe that can tell you what A or B are from just the "ciphertext" without knowing it's complement.


We've got cellphones so small that they're difficult to actually push the buttons on. We still haven't put plumbers out of their jobs. I still don't have my jetpack, or flying car. There are no rayguns. No Mars mission. No monolith. No AI.


Why the Rant? It is just a game...
Heath Robinson
QUOTE (The Jake @ Jun 3 2009, 01:28 AM) *
Isn't this why Unwired explicitly states all crypto is crackable? That sidebar allows for GMs to introduce uncrackable crypto as a special plot hook.

You have to assume the rules cover the process or you go mad.

Who is to say that computational speeds and heuristic analysis can't determine patterns in algorithm and key selection? Also for an eavesdropping attacker able to intercept the key exchange, things change dramatically.

Suspension of disbelief people. smile.gif

Except that it's Malachi's argument that encryption that is fundamentally unbreakable today should magically become breakable tomorrow without the invention of an oracle. It's insane that the idea of unbreakable encryption (which exists today and is on Mathematically proven grounds) is apparently less believable than technology which allows you to induce the currents in a device within LOS in a consistant, reliable manner that lets you turn people off.


I forgot to mention that the unbreakability of an OTP is positively proven. It's not that no attacks currently exist for it, there are no attacks for it. The distinction is subtle but extremely important.

QUOTE (Tymeaus Jalynsfein @ Jun 3 2009, 01:44 AM) *
Why the Rant? It is just a game...

People are wrong. On the internet. They have no excuse because Wikipedia is just over there. And when you link them to a relevent article THEY IGNORE IT! I put a lot of work into learning shit so that I know where I can sensibly stand. It's offensive when someone refuses to put even a little bit of effort into understanding the area THEY ARE ARGUING ABOUT. It's basic courtesy to know what the fuck you're spouting off about.

And this isn't even a game. This is someone arguing that the big believability problem he has with Frank's rules are that they use actual real encryption that has been positively proven unbreakable. That's like stating that the big believability problem you have with the SR4 rules are that pieces of metal flying through the air are still inimical to unprotected human lives.
Draco18s
QUOTE (Heath Robinson @ Jun 2 2009, 07:44 PM) *
I forgot to mention that the unbreakability of an OTP is positively proven. It's not that no attacks currently exist for it, there are no attacks for it. The distinction is subtle but extremely important.


Correct. It has to do with the fact that if you have a 100 character long plain text and a 100 long cyphertext using a OTP then every possible 100 character message can be encoded in the same cyphertext, just using a different key.
Draco18s
QUOTE (Heath Robinson @ Jun 2 2009, 07:44 PM) *
I forgot to mention that the unbreakability of an OTP is positively proven. It's not that no attacks currently exist for it, there are no attacks for it. The distinction is subtle but extremely important.


Correct. It has to do with the fact that if you have a 100 character long plain text and a 100 long cyphertext using a OTP then every possible 100 character message can be encoded in the same cyphertext, just using a different key.
Jaid
QUOTE (Heath Robinson @ Jun 2 2009, 08:44 PM) *
And this isn't even a game. This is someone arguing that the big believability problem he has with Frank's rules are that they use actual real encryption that has been positively proven unbreakable. That's like stating that the big believability problem you have with the SR4 rules are that pieces of metal flying through the air are still inimical to unprotected human lives.

his biggest problem with franktrollman's rules have nothing to do with encryption. over and over and over, it has been pointed out that frank went to all kinds of trouble to introduce realistic (and unbreakable) encryption, but then went ahead and introduced the ability to modify electrical devices using RF waves from a distance of line of sight, including turning them on. i haven't noticed anyone objecting to the realistic nature of unbreakable encryption being accurate, can you point out where anyone has actually said they found frank's rules for encryption to be innacurate?
Heath Robinson
QUOTE (Jaid @ Jun 3 2009, 02:00 AM) *
his biggest problem with franktrollman's rules have nothing to do with encryption. over and over and over, it has been pointed out that frank went to all kinds of trouble to introduce realistic (and unbreakable) encryption, but then went ahead and introduced the ability to modify electrical devices using RF waves from a distance of line of sight, including turning them on. i haven't noticed anyone objecting to the realistic nature of unbreakable encryption being accurate, can you point out where anyone has actually said they found frank's rules for encryption to be innacurate?


QUOTE (Malachi @ Jun 2 2009, 11:29 PM) *
Except for the part where he goes on for pages about why encryption can't be hacked. That's what bothers me the most about Frank's rules. He goes on for blah blah blah about encryption, using technology capabilities from right now as his basis for argument, and then later gives Hackers the ability to affect circuitry that is OFF, at a range of Line of Sight, by manipulating the very electrons that may or may not be present in it, at the quantum level ("or something").... but faster decryption is way beyond suspension of disbelief... oh well.


The subtle point is Frank is talking about the actually, really, truly, absolutely unbreakable OTP. It's not "unbreakable before the sun eats earth like a delicious sweetmeat", OTPs cannot be broken with anything less than a full blown oracle. That's the problem with Malachi's argument. Faster decryption can't help when something can't be broken through cryptanalysis.

When I point out that Malachi's argument is not sound he proceeds to launch into a tirade about how OTPs are not currently broken. Which is just wrong. Like I've mentioned millions of times. I'd even linked him to the Wikipedia article before he started that line of argument. When people appear to say "dude, it's just a game" they're wrong because Malachi started arguing about Mathematics when he started saying that OTPs are even theoretically breakable.
Traul
QUOTE (Heath Robinson @ Jun 3 2009, 01:44 AM) *
There exist no theoretically possible attacks on OTP encryption. It just can't exist. There's no reuse of any bit of entropy - every bit of the plaintext is combined with an independant phenomena such that you can't pry things apart at all. It's a mathematically impossibility.


Mathematical theorems are proven wrong by technology everyday. Not that the guy who wrote the proof got it wrong, but the guy who read it forgot some hypotheses and tried to apply it where he shouldn't have. There are plenty of exploit examples in the wikipedia link you just gave:

- OTP is safe for random pads. If you're using a pseudo-random generator instead, nothing guarantees that the generator itself cannot be cracked, thus granting the attacker knowledge of your future pads.
- OTP is not a full protocol. Putting a OTP in a system does not magically make the whole system secure. Actually, it's pretty much the opposite. You need at least 1 other safe algorithm for OTP to work, because the pad itself will have to be sent at some point (for that matter, let's consider tattooing the pad on a slave's skull an algorithm grinbig.gif ). This is the main reason for OTP not being used for digital cryptography, not the cost. As long as the pad and the data are transmitted through the same channel, the gain is null. Now you'll probably answer with quantic safe pad generation, but then we leave the comfortable world of mathematical certitudes to enter physics where a model is only valid until further experience proves it incomplete. What tells you quantum cryptography will still be safe in 2070?
Tymeaus Jalynsfein
QUOTE (Heath Robinson @ Jun 2 2009, 05:44 PM) *
People are wrong. On the internet. They have no excuse because Wikipedia is just over there. And when you link them to a relevent article THEY IGNORE IT! I put a lot of work into learning shit so that I know where I can sensibly stand. It's offensive when someone refuses to put even a little bit of effort into understanding the area THEY ARE ARGUING ABOUT. It's basic courtesy to know what the fuck you're spouting off about.

And this isn't even a game. This is someone arguing that the big believability problem he has with Frank's rules are that they use actual real encryption that has been positively proven unbreakable. That's like stating that the big believability problem you have with the SR4 rules are that pieces of metal flying through the air are still inimical to unprotected human lives.


I will bite...

Just because information is free and on the internet (Wikipedia or otherwise) does not make the information factual... I too do research, and enjoy it immensly, however, I do not automatically assume that the information found on the Internet is reliable and accurate without cross referencing over many sources... Because of this, i tend to take related links with a grain of salt until I have researched their veracity, as I am sure that you do... Many people do not get off on this type of research and so do not pursue it... It is not that big of a deal... and even so, they sometimes do have arguable points that I would consider...

Secondly... Frank's ideas are not, in my opinion, nor apparently in a lot of other's opinion, Canon Rules for the Sahdowrun environment... they are Personal Hacks/Houserules that he enjoys for his own edification... No reason to get all bent out of shape (on either side) because they have no relevance to the RAW of Shadowrun... They are personal preference... Everyone has their own preferences, some of which make a lot of sense, and some which do not... Your Mileage may vary, of course...

Hope that I don't upset you with this viewpoint, but there it is...

My 2 nuyen.gif

Tymeaus Jalynsfein
QUOTE (Heath Robinson @ Jun 2 2009, 06:13 PM) *
The subtle point is Frank is talking about the actually, really, truly, absolutely unbreakable OTP. It's not "unbreakable before the sun eats earth like a delicious sweetmeat", OTPs cannot be broken with anything less than a full blown oracle. That's the problem with Malachi's argument. Faster decryption can't help when something can't be broken through cryptanalysis.

When I point out that Malachi's argument is not sound he proceeds to launch into a tirade about how OTPs are not currently broken. Which is just wrong. Like I've mentioned millions of times. I'd even linked him to the Wikipedia article before he started that line of argument. When people appear to say "dude, it's just a game" they're wrong because Malachi started arguing about Mathematics when he started saying that OTPs are even theoretically breakable.



Unbreakable Encryption would destroy a valuable part of the world of Shadowrun... It has no place in the environment... If you want stronger encryption schemes, use the optional rules in Unwired and relegate the Hacker to a nonentity status... Yeah, that would be a lot of fun, wouldn't it?
Cthulhudreams
Okay, lets just get this out there. Well implemented one time pads are unbreakable.

As for pad transmission - storage is free in SR. You can just give someone a stupidly huge pad physically and they can make voice calls to you for a hundred years.
Tymeaus Jalynsfein
QUOTE (Cthulhudreams @ Jun 2 2009, 06:56 PM) *
Okay, lets just get this out there. Well implemented one time pads are unbreakable.

As for pad transmission - storage is free in SR. You can just give someone a stupidly huge pad physically and they can make voice calls to you for a hundred years.



Again, Why Bother?... It is Not supported by the system... ALL Encryption can be broken per the SR4 Rules... It is just a matter of a few seconds work...
Heath Robinson
QUOTE (Tymeaus Jalynsfein @ Jun 3 2009, 02:44 AM) *
Unbreakable Encryption would destroy a valuable part of the world of Shadowrun... It has no place in the environment... If you want stronger encryption schemes, use the optional rules in Unwired and relegate the Hacker to a nonentity status... Yeah, that would be a lot of fun, wouldn't it?

Just rolling some dice is boring. When you actually have to think the game becomes interesting. Let's face it - Encryption is really just a pointless delay (more rolling between me and getting to actually do stuff), or it nukes all chance of doing anything if you forgot to buy the program and can't afford to buy it now. It doesn't actually add anything to the game. Why do we have it at all?

Some of us look at a challenge and say "I have a better idea". Since Encryption is basically just a cost-to-attack increase it just incentivises finding a better way to attack the organisation. The cost of unbreakable encryption over breakable encryption is, I think, smaller than the cost of having encryption represented in the game at all over having none. At least according to your argument.

A hacker that doesn't use social engineering to attack the target is being lazy.

QUOTE (Tymeaus Jalynsfein @ Jun 3 2009, 02:41 AM) *
Just because information is free and on the internet (Wikipedia or otherwise) does not make the information factual... I too do research, and enjoy it immensly, however, I do not automatically assume that the information found on the Internet is reliable and accurate without cross referencing over many sources... Because of this, i tend to take related links with a grain of salt until I have researched their veracity, as I am sure that you do... Many people do not get off on this type of research and so do not pursue it... It is not that big of a deal... and even so, they sometimes do have arguable points that I would consider...

Secondly... Frank's ideas are not, in my opinion, nor apparently in a lot of other's opinion, Canon Rules for the Sahdowrun environment... they are Personal Hacks/Houserules that he enjoys for his own edification... No reason to get all bent out of shape (on either side) because they have no relevance to the RAW of Shadowrun... They are personal preference... Everyone has their own preferences, some of which make a lot of sense, and some which do not... Your Mileage may vary, of course...


So refer to Everything2 and Google. I also know a cypherpunk, who schooled me in the arts of basic crypto. OTPs are Mathematical fact. You can also check the history of edits (and what the article looked like before and after) on Wikipedia, so you can see how controversial a topic is (controversial topics tend to be more unreliable). Mathematical and Scientific topics on Wikipedia tend to be very reliable because there's no room for controversy when something is emprically observable or just factually correct.

I'm not even sure why Malachi brought up Frank's rules. Except that he might have remembered that I happen to like Frank's rules, partially for their willingness to delve into real world topics and how they affect game worlds, and partially because I happen to like how Frank is willing to be honest about why he made some of the choices he did.

QUOTE (Tymeaus Jalynsfein @ Jun 3 2009, 03:11 AM) *
Again, Why Bother?... It is Not supported by the system... ALL Encryption can be broken per the SR4 Rules... It is just a matter of a few seconds work...

Did you not see the bit where I explained that Malachi stopped arguing about SR4 the moment he claimed that well implemented OTPs were theoretically breakable? That's the domain of Information Theory, Cryptography, Mathematics. If I said that bits of flying metal were not inimical to human life you'd tell me war stories about friends who'd gotten shot and died. How is it different when it's Information Theory instead of bullets? Why this double standard?


In SR4 land the world seems to forget that OTPs exist, and I am willing to hammer the I Believe button. My original post introduced a better way of handling cracking encryption that removes some of the abuses without wall-banger rules.


Also,
Malachi's point might have been aimed at Frank's EUE. In which case he's still wrong. With an increase in processor speed you can begin using more computationally intensive algorithms with horrendous keysizes and just as much work goes into building a better mousetrap when the old one is broken (or even slightly tarnished) as goes into breaking the old mousetrap. EUE won't stay still, it'll be just as annoying to break tomorrow as today. Possibly harder since they'll have had more experience and there's serious signs that progress is accelerating. It generally takes more effort to produce a good crypto attack.

It wasn't a decade ago that we were using DES as a high security algorithm. The advance in processing technology hasn't made Encryption any weaker to cryptanalysis. In fact, they're generally getting more resistant and I can see that trend continue.
Shinobi Killfist
QUOTE (Heath Robinson @ Jun 2 2009, 08:44 PM) *
Except that it's Malachi's argument that encryption that is fundamentally unbreakable today should magically become breakable tomorrow without the invention of an oracle. It's insane that the idea of unbreakable encryption (which exists today and is on Mathematically proven grounds) is apparently less believable than technology which allows you to induce the currents in a device within LOS in a consistant, reliable manner that lets you turn people off.


I forgot to mention that the unbreakability of an OTP is positively proven. It's not that no attacks currently exist for it, there are no attacks for it. The distinction is subtle but extremely important.


People are wrong. On the internet. They have no excuse because Wikipedia is just over there. And when you link them to a relevent article THEY IGNORE IT! I put a lot of work into learning shit so that I know where I can sensibly stand. It's offensive when someone refuses to put even a little bit of effort into understanding the area THEY ARE ARGUING ABOUT. It's basic courtesy to know what the fuck you're spouting off about.

And this isn't even a game. This is someone arguing that the big believability problem he has with Frank's rules are that they use actual real encryption that has been positively proven unbreakable. That's like stating that the big believability problem you have with the SR4 rules are that pieces of metal flying through the air are still inimical to unprotected human lives.


Yes, things we prove factually now will never be disproved. Because we got the maths and science down pat this time. Because yeah like 60 years in a Science Fiction future they totally could never figure shit out that we thought was impossible. Malachi's point wasn't that in real life it would or should be breakable in the future, but that sometimes people invent shit and figure things out we never thought of and while its not a would its a could be possible, especially in a Fantasy game future. .
Tymeaus Jalynsfein
QUOTE (Heath Robinson @ Jun 2 2009, 07:20 PM) *
Just rolling some dice is boring. When you actually have to think the game becomes interesting. Let's face it - Encryption is really just a pointless delay (more rolling between me and getting to actually do stuff), or it nukes all chance of doing anything if you forgot to buy the program and can't afford to buy it now. It doesn't actually add anything to the game. Why do we have it at all?

Some of us look at a challenge and say "I have a better idea". Since Encryption is basically just a cost-to-attack increase it just incentivises finding a better way to attack the organisation. The cost of unbreakable encryption over breakable encryption is, I think, smaller than the cost of having encryption represented in the game at all over having none. At least according to your argument.

A hacker that doesn't use social engineering to attack the target is being lazy.


I agree with this... there are always ways to obtain access without having to go the route of decryption... Sometimes though, it is the easiest route... Remember, Encryption is just a speed bump in the hackers path... that is all it was meant to be in the game...


QUOTE
So refer to Everything2 and Google. I also know a cypherpunk, who schooled me in the arts of basic crypto. OTPs are Mathematical fact. You can also check the history of edits (and what the article looked like before and after) on Wikipedia, so you can see how controversial a topic is (controversial topics tend to be more unreliable). Mathematical and Scientific topics on Wikipedia tend to be very reliable because there's no room for controversy when something is emprically observable or just factually correct.

I'm not even sure why Malachi brought up Frank's rules. Except that he might have remembered that I happen to like Frank's rules, partially for their willingness to delve into real world topics and how they affect game worlds, and partially because I happen to like how Frank is willing to be honest about why he made some of the choices he did.

Did you not see the bit where I explained that Malachi stopped arguing about SR4 the moment he claimed that well implemented OTPs were theoretically breakable? That's the domain of Information Theory, Cryptography, Mathematics. If I said that bits of flying metal were not inimical to human life you'd tell me war stories about friends who'd gotten shot and died. How is it different when it's Information Theory instead of bullets? Why this double standard?


I would also tell you stories where I have seen people shot to hamburger that have survived... it is all relative...

QUOTE
In SR4 land the world seems to forget that OTPs exist, and I am willing to hammer the I Believe button. My original post introduced a better way of handling cracking encryption that removes some of the abuses without wall-banger rules.


I am not arguing the reality of OTP Encryption... just that it does not need a place in SR4 for the hacking rules to be playable... I think that they are imminently playable as they are, and have been using the MAtrix RAW since SR4 game came out... I (nor our group) have had any problems with the RAW...

Just my Opinion though, as I know that not everyone agrees...
Traul
QUOTE (Cthulhudreams @ Jun 3 2009, 03:56 AM) *
As for pad transmission - storage is free in SR.

Up to what the GM deems reasonable.
QUOTE
You can just give someone a stupidly huge pad physically and they can make voice calls to you for a hundred years.

What were we saying before? rotate.gif

Anyway, as long as the pads are exchanged physically, the system cannot be deployed for public use and will be reserved for high security areas. This is exactly what Dramatic Encryption stands for.

Another reason for OTP rarity could be the price of pad generating. Pads are huge, thus any long term dependency in the random generator that would not be a problem under normal conditions might flaw the pads. One might have to resort to high class hardware generators.
Cthulhudreams
QUOTE
high security areas


Last I checked we're playing a game about people who go violate high security areas for money. That's what being a 'shadowrunner' is about right. Just getting us on the same page here.

Talking about people outside of high security areas or security conscious professions is functionally the same as talking about people who don't exist for all it matters.

Traul
There is high security and HIGH security. According to OTP's Wikipedia page, one of the most recent uses of OTP was to secure the red phone. I don't know exactly what would be the equivalent to that in 2070, let's say the communications to Zürich Orbital. Do shadowrunners really get to infiltrate that kind of security on a regular basis?
Tymeaus Jalynsfein
QUOTE (Traul @ Jun 2 2009, 09:11 PM) *
There is high security and HIGH security. According to OTP's Wikipedia page, one of the most recent uses of OTP was to secure the red phone. I don't know exactly what would be the equivalent to that in 2070, let's say the communications to Zürich Orbital. Do shadowrunners really get to infiltrate that kind of security on a regular basis?



Not casually anyway... Not if I want to keep my gray matter inside of my skull...
Draco18s
Alright, we have to break this down into game terms:

No security:
- A guy talking to another guy over the phone.
Low security:
- Day to day encryption of the general public
Medium security:
- Small business company records of non-incriminating nature
High security:
- Triple A corp personnel records
Super high security:
- AAA R&D papers
Unbreakable security:
- Zurich Space Station

In general runners will be dealing with medium to super high security, depending on the job and their experience. The game needs to function within these bounds while allowing for higher and lower options.

As written there are three effective levels:

None, Low, and Unbreakable.

The guy on the street who wishes to keep his personal dark secrets a secret from his ex-wife can go out and buy
Encrypt Rating 6. A tad pricy at 6000 nuyen.gif , but he can do it.

What do Triple A corps have access to? At best Rating 9, by RAW. You'd think that'd push it up towards Super High security, but it doesn't. It gives us "Medium," any PC hacker with Rating 4 Decrypt can crack rating 9 Encrypt given a few minutes. If he only has Rating 1 Decrypt, it takes him a half hour, tops.

What it is that makes a half hour deadly? Black IC, unfriendly hackers, cybercombat.

Which makes the system devolve into a series of sub-systems derailing the game at the table into a four hour session as the PC has to repeatedly fight off ice and other threats.

This isn't good.
Jaid
QUOTE (Heath Robinson @ Jun 2 2009, 08:13 PM) *
The subtle point is Frank is talking about the actually, really, truly, absolutely unbreakable OTP. It's not "unbreakable before the sun eats earth like a delicious sweetmeat", OTPs cannot be broken with anything less than a full blown oracle. That's the problem with Malachi's argument. Faster decryption can't help when something can't be broken through cryptanalysis.

maybe you should read the second half of the quoted sentence: he has problems that frank spent so much time going on about how realistically encryption should be unbreakable, (notice the lack of a period or other punctuation denoting a new, separate idea. given the lack of any such punctuation, logically we should assume that the following is not just something he randomly said, but is rather related in some way) and then went ahead and introduced a rules system that assumes you can control devices through RF, regardless of whether they are wireless-enabled or not, turned on or off, and even regardless of whether or not they run on electricity. ie, he went to all the effort of hammering on unrealism in encryption, and then proceeded to introduce rules that require far more suspension of disbelief than poorly modeled cryptography will cause for most people.

unless of course you're suggesting that current theories show it's easy to turn on a computer with your cellphone from 100 meters away when that computer is not even attached to a power supply and has no wireless capabilities whatsoever. in which case, i would encourage you to check your sources.
Cthulhudreams
Part of his point is that it's very easy to accept 1 new fact if everything is consistent with that. He adds electron teleportation with a range of LOS to the game if using biomechanical computers, and everything flows from that.

The problem with changing something that that actually exists is that 'we all know how it works.'

Note that he explicitly rules out RF as the transmission medium for high density signal and say it's something new made of handwavium.

However, really it boils down to a lack of internal consistency is the main problem with the matrix rules - and it applies for encryption. If encryption doesn't work, the system doesn't work. If it does work, why are PCs and 90% of people issued with the non functional version?
Malachi
QUOTE (Heath Robinson @ Jun 2 2009, 08:20 PM) *
I'm not even sure why Malachi brought up Frank's rules. Except that he might have remembered that I happen to like Frank's rules, partially for their willingness to delve into real world topics and how they affect game worlds, and partially because I happen to like how Frank is willing to be honest about why he made some of the choices he did.

I had no idea what you liked or didn't like. Me bringing it up had nothing to do with you.

QUOTE (Heath Robinson @ Jun 2 2009, 08:20 PM) *
Also,
Malachi's point might have been aimed at Frank's EUE. In which case he's still wrong. With an increase in processor speed you can begin using more computationally intensive algorithms with horrendous keysizes and just as much work goes into building a better mousetrap when the old one is broken (or even slightly tarnished) as goes into breaking the old mousetrap. EUE won't stay still, it'll be just as annoying to break tomorrow as today. Possibly harder since they'll have had more experience and there's serious signs that progress is accelerating. It generally takes more effort to produce a good crypto attack.

My point is: I find it.... difficult that Frank's rules give hackers an almost magical control over technology (affecting it while it is off, or manipulating it on the molecular/quantum level via EM waves) and yet the rules are so grounded on current technology thinking about the speed with which Encryption can be broken today. If sci-fi level technology is to be believed for game mechanics reasons on one aspect of a game, it seems odd to completely dismiss a game-mechanic favourable result in another area.
Jhaiisiin
We used to KNOW that you couldn't sail around the world. It was widely accepted fact.
We used to KNOW that you couldn't break the sound barrier.
We used to KNOW that there were nothing smaller than electrons.

Each of these were factually correct in their time, with the knowledge we had at our fingers. Even theories didn't break the "facts." Eventually, time has proven each wrong. Right now, there is unbreakable encryption via OTP's. Every theory we have shows that to be factually true. Regardless of that, 60 years and we may have multi-level quantum computing able to determine every possible PAD for the item in question, measure the entropy involved, use it's own random generators or something, and determine most likely possible keys to try, thus allowing the breaking of the encryption.

Is it far-fetched? Sure. Plausible? Barely. Does it matter one little bit? Not in the least. Why keep arguing about it?
Draco18s
QUOTE (Jhaiisiin @ Jun 2 2009, 11:12 PM) *
Regardless of that, 60 years and we may have multi-level quantum computing able to determine every possible PAD for the item in question, measure the entropy involved, use it's own random generators or something, and determine most likely possible keys to try, thus allowing the breaking of the encryption.

Is it far-fetched? Sure. Plausible? Barely. Does it matter one little bit? Not in the least. Why keep arguing about it?


We also know that 2 + 2 is 4 and has always been true, it's a mathematical fact.

We're not going to discover in 60 years that 2 + 2 is 5 all of a sudden.
nspace
Regarding the OP... Wouldn't the easiest solution be to just not have the NPCs do the reconnects? It sounds more expensive or more complicated than not reconnecting, therefore just assume that the corp won't spring for it. Maybe the people communicating don't understand that cycling re-connections is safer. There could be a world of difference between what the mechanical rules for a setting are, and what an NPC believes.


As for the whole OTP arm waving stuff. Saying something is *impossible* is a really good way to make yourself look stupid eventually. I'm pretty sure that dividing by zero is impossible by definition. Yet then you've got that troublesome calculus stuff which lets you do exactly that.

Just like I'm sure that someone 60 years ago would have told you that something like CDMA was crazy talk.
kzt
QUOTE (Heath Robinson @ Jun 2 2009, 08:46 AM) *
The problem here is, by it's very nature, down to the fact that a particular instance of the Encryption is cracked. Dropping the instance and replacing it resets all progress made. Cycling periodically renders nodes impossible to crack.

No, because they have to communicate using a channel you have already decrypted. Once you do that you can simply grab the OTAR packets and rekey yourself.

To reset you have to use an out-of-band communications to rekey.
Jaid
calculus doesn't let you divide by 0. it lets you figure out as you progressively get closer and closer to 0 (but never quite reaching it) what number you're getting closer and closer to (but never quite reaching)
Draco18s
QUOTE (nspace @ Jun 2 2009, 11:37 PM) *
As for the whole OTP arm waving stuff. Saying something is *impossible* is a really good way to make yourself look stupid eventually. I'm pretty sure that dividing by zero is impossible by definition. Yet then you've got that troublesome calculus stuff which lets you do exactly that.


If I have two numbers, A and B and I add them together and tell you the result, C, knowing nothing else it is impossible to derive A and B.

Try it.

C is 112

Hint: there are more than 112 solutions.
Crusher Bob
QUOTE (Jhaiisiin @ Jun 3 2009, 12:12 PM) *
We used to KNOW that you couldn't sail around the world. It was widely accepted fact.
We used to KNOW that you couldn't break the sound barrier.
We used to KNOW that there were nothing smaller than electrons.


Each of these is a childish misrepresentation of knowledge at the time.

No one used to be willing to risk their lives on an attempt to sail around the world, when regular sailing was dangerous enough, and there was no money in it.

Breaking the sound barrier with propeller driven aircraft does appear to be almost impossible, but at the time the Bell X-1 was being developed, bullets had been going faster than sound for around 100 years.

"Electrons appear to be elementary particles." is a considerably different statement.
This is a "lo-fi" version of our main content. To view the full version with more information, formatting and images, please click here.
Dumpshock Forums © 2001-2012