Help - Search - Members - Calendar
Full Version: Stronger (canon?) Encryption
Dumpshock Forums > Discussion > Shadowrun
Pages: 1, 2
Blade
I've considered the bank-robbing issue, I even use some houserules to make such encryption tougher (but with limitations and constrains to make sure that only important data transfer use them).

But even without those houserules, there's something that prevents hackers from messing with money transfer : the fact that you can be sure that they'll do everything they can to find you.
There was this hacking simulation video game, Uplink, where you could hack a bank (if you had high rating software) and get a whole load of money easily. But if you didn't make sure to erase each and every trace of your action in the following seconds, you got caught almost immediately.

Just like in the physical world, the two best way to protect something in the Matrix are :
1) to make sure that no-one knows about it
or 2) to make sure that no-one will even think about messing with it
mfb
man, Uplink is awesome.
kzt
QUOTE (Moon-Hawk)
My only problem is that there is no middle ground.  All encryption is either broken in a few seconds, or not at all.  And maybe that is the way it should be, in that there is either some known exploit or they used Password1 and it's broken almost immediately, or there isn't and it'll take a bajillion years to brute force.  But I don't care, 'cause I think it would be more fun if there was some possible way for a hacker to occasionally actually have to work at encryption before getting it.

Logically all or nothing would be fine. And the obvious way to have the hacker work at it until he breaks it is to have him works at STEALING the key rather then trying to decrypt it by brute force.

If you rapidly break encryption you are typically defeating the weak passwords or a poorly implemented cryptosystem that leaks data. Or some idiot who thinks he understands cryptography and write some POS that is not secure. Like Micro$oft Pa$$word "encryption".

The trick is for the GM to only use secure crypto where it logically makes sense. And there are really fewer than most people seem to think. And you can still have fun and have unbreakable crypto if this is handled correctly.

Lots of people like the idea that they can encrypt their files so no unauthorized user can get to them, but how many are willing to actually enter the numerous encryption and decryption passwords a zillion times a day? Where will they keep their passwords so they won't forget them? Will they be good passwords or easy to remember passwords? Easy to remember passwords are the ones that you typically can break in a trivial amount of time. So either people won’t do it or it’s trivial to break.

If you use some sort of automatic system that relieves an individual of the need to be entering the key themselves, how does a computer system know that a hacker who breaks into a system as a user isn’t that user? In this case the file can be encrypted in a totally unbreakable cipher in main storage, but when you ask for a copy it’s provided in a useable (hence unencrypted) form. I really don’t see how anyone would protect against this, other then possibly by the system requiring some additional verification before they decrypt the file for you. And if you have compromised the system enough that won’t help.

So file encryption is going to typically only be a problem is you steal an off-site backup or a physical system and didn’t get the keys. And in a properly done system getting the keys for these is very hard, so it makes these thefts fairly pointless.

The typical area where attackers would encounter major issues with crypto would be in transmissions. For example, a corporate wireless network would be essentially invulnerable to being intercepted or entered without inside knowledge. Traffic between cooperate sites, drone networks, secure chat rooms, and financial transactions would be other examples where it would is reasonable to expect that the traffic can’t be decoded unless someone is a fool or you have inside information. (If someone wants you to tap the link between two Aries research sites you're probably going to have to break in and install a tap on the cable. That's why they pay you the big bucks.)

I’m not sure where the typical person to person message would fall. In the real world the encryption mechanisms provided with cell phones have not been very strong, and people who wanted really secure cellular phone calls needed to use additional hardware or software to provide the actual security. Even as people migrate to systems that do properly encrypt the call between the base station and the handset the carrier has the keys. And once the call is received how it is protected in transit to the other base station is really unclear. And while email encryption has been out there for years, when was the last time you got an encrypted email?

If you assume that public key system are in some fashion able to be used in an environment where quantum computers exist (which appears possible – but not assured) that would allow semi-random strangers to call you and have the call end-to-end secure.

If this is true you can then also have secure email with semi-random strangers. At least until you temporarily misplace your comlink, with or without assistance, and lose your private keys to a shadowrunner smile.gif Even if public key crypto doesn’t work you can certainly send encrypted messages to people who you have an established relationship with and be pretty sure that nobody without the key can read it.
Serbitar
QUOTE (mfb)
what is this "wireless" you speak of? i know no wireless! inch-thick cables all the way!

seriously, though. i was discussing SR3 stuff because some sneaky bastard brought it up. explainorating SR4 isn't my bidness.

SR3 is wireless. You have wireless communications and my SR3 was accessing the matrix almost exclusively by wireless means.
hobgoblin
true that serbitar, but you still had only VR. at best you could go without RAS and the deck in a backpack and hope your GM didn't have you roll balance checks when trying to walk nyahnyah.gif
Rotbart van Dainig
QUOTE (hobgoblin)
true that serbitar, but you still had only VR.

AR was there in SR3, too - it was just hidden.

Tortoise mode operations were handled in meat-space and, given programs with options that increase detection factor, you could actually do some hacking.
As the only limiting factor for a tortoise was memory, with a headware phone and enough headware memory you were good to go.
fistandantilus4.0
Tortoise had a limit on IPs as well, and you couldn't die from Black IC. Tough trade.
Rotbart van Dainig
QUOTE (fistandantilus3.0)
Tortoise had a limit on IPs as well, and you couldn't die from Black IC. Tough trade.

Well, AR has no limit... but tortoise didn't trigger ICE at all, nor were they enganged in cyber combat. You were simply cast out at the third trigger step. wink.gif
This is a "lo-fi" version of our main content. To view the full version with more information, formatting and images, please click here.
Dumpshock Forums © 2001-2012