QUOTE (Smokeskin @ Jan 1 2010, 05:42 PM)

The reason one-time pads aren't used in the real world is because public key encryption is practically unbreakable. That isn't true for SR.
PK encryption is practically unbreakable because most people don't have the computing resources to brute force the encryption. This will -not- change in SR. One of the major reasons we use current strength keys is due to limitations of computing power. So while SR available hardware will be able to easily break modern encryption key sizes, key sizes will increase thus increasing the required processing power needed to break it. Moore's law is a benefit to BOTH sides of the encryption battle.
--
QUOTE (Draco18s @ Jan 1 2010, 06:46 PM)

There's already a disconnect there as to how the people who make fake SINs manage to do so while the PCs can not. The cost and interval implies that takes a few days to a couple weeks for these organizations to crank out a new SIN for someone (would you charge $4000 for 9 months worth of highly illegal work? No. Would you charge $4000 for a week's worth of highly illegal work? Hell yeah you would).
That depends.... how many fake SINs can I make at once?
--
QUOTE (ZeroPoint @ Jan 3 2010, 03:27 PM)

First off, with all forms of encrypted transmission, you can't capture any of the data until you have broken the encryption.
This is definitely not like real world encryption. Sounds a lot more like quantum cryptography to me.
But quantum cryptography isn't really an encryption scheme, its more of a method of transmitting encrypted data.
Quantum cryptography is a method of determining encryption keys. It allows you to create symmetric keys without having to go through the rigors of distributing them. It would make asymmetric encryption obsolete and unnecessary. It won't be as secure as physically transporting the key and using a chain of custody, but it will be good enough to replace any public key schemes.
QUOTE (ZeroPoint @ Jan 3 2010, 03:27 PM)

We would still have to implement some method of encryption. And in SR with all standard forms of encryption being broken, unfortunately that's all that is left. But when combined with quantum cryptography, now any would be listeners can't just snoop it, they have to try to decrypt it, alerting the sender that an encryption attempt is being made so that they can stop transmission, change channels, change keys, or any number of other things. Making encryption a lot more useful.
The encryption technique based of prime numbers -may- be broken. However their are encryption techniques which have been mathematically
proven to be unbreakable.
QUOTE (ZeroPoint @ Jan 3 2010, 03:27 PM)

There are still problems with trying to rationalize that, but its the best I can think of at the moment.
Static file encryption is still gonna be mostly useless. But for that at least you will be able to rely on the system security.
Also, the problem with OTP methods is that they still rely on random strings. There is no such thing as random in the computing world. And the larger the random string, the more likely you are that your random string is gonna break itself as suddenly it starts repeating (given that it might be after a few trillion digits, but if your transmitting terabytes of data on a regular basis that's gonna happen a lot). Which basically means once someone knows how your random strings are seeded its not really gonna take very long to break your OTP. If there is some magic equation that can break any and all PSK and PKI encryption methods, then its not gonna be that hard to break an OTP.
And lets not cry doom over encryption being unbreakable. If all encryption was always unbreakable and everything was encrypted, there are still so many other ways for a hacker to be a hacker and get the job done.
It's actually not even necessary for encryption on a static file to need to be broken by PCs. Given the storage space available in a data steal a hacker can just dump all the files and deliver them to Johnson, unless the Johnson is paying for the files to be decrypted. Let the corps with their significantly more vast computing power go through the rigors of breaking the encryption. It still boils down to the whole at rest versus in motion issue of defending data. Data in transit has always been more vulnerable than data sitting on a server and there's no reason why this would change. I'm willing to suspend disbelief for encryption on data transmissions to be broken in minutes by PCs. I just cannot cross that barrier for data that is at rest.