02-27-2018, 11:48 AM | #12 | |
Banned
Join Date: Jun 2005
Location: Bristol
|
Re: Hacking Question
Quote:
From my understanding Encryption is Basic or Secure. Getting a TL9 computer to run at Comp 8 is pretty difficult or expensive. Where as TL Comp 8 is fairly expensive whereas Comp 10 is serious money and size. |
|
02-27-2018, 11:58 AM | #13 |
Join Date: Feb 2005
Location: Berkeley, CA
|
Re: Hacking Question
UT47, description of 'basic encryption' and 'secure encryption'. "Add +2 to the required Complexity per TL after TL9"
|
02-27-2018, 12:33 PM | #14 |
Join Date: Feb 2016
|
Re: Hacking Question
Which pretty much means that you need a Macroframe (Complexity 8) at TL 9 and TL 10 to decrypt civilian encryption in one hour and a Fast Megacomputer to decrypt military encryption in one hour (alternatively, you can use a Quantum Tiny Computer to decrypt civilian encryption in one hour or a Quantum Personal Computer to decrypt military encryption in one hour). Realtime decryption at TL9 or TL10 requires a Quantum Mainframe for civilian encryption or a Quantum Megacomputer for military encryption. If you are playing a hacker, it is just better to purchase a quantum computer than to purchase the normal computer (a TL9 or TL10 Fast Megacomputer costs $200M while a TL9 or TL10 Quantum Personal Computer costs $10k). Heck, Quantum computers are just better because an organization would only spend $100M for a TL9 or TL10 Quantum Megacomputer that can decrypt military encryption in realtime while the same organization would spend $200M for a TL9 or TL10 Fast Megacomputer that can decrypt military encryption in one hour.
|
02-27-2018, 01:55 PM | #15 |
Banned
Join Date: Jun 2005
Location: Bristol
|
Re: Hacking Question
|
02-27-2018, 02:09 PM | #16 | |
Join Date: Feb 2005
Location: Berkeley, CA
|
Re: Hacking Question
Quote:
Also a note for quantum communication: someone interrupting the channel doesn't just alert the user. It makes the content of the channel unreadable by anyone. |
|
02-27-2018, 02:10 PM | #17 |
Hero of Democracy
Join Date: Mar 2012
Location: far from the ocean
|
Re: Hacking Question
I will point out that this refers to the difficulty of breaking the encryption, not the overall difficulty of hacking in. Often, the encryption is the best defended part of security while other aspects are neglected. None of the world's most famous viruses have relied on breaking encryption. Subtle vulnerabilities that avoid breaking encryption are the bread and butter of computer security.
__________________
Be helpful, not pedantic Worlds Beyond Earth -- my blog Check out the PbP forum! If you don't see a game you'd like, ask me about making one! |
02-27-2018, 02:37 PM | #18 | |
Join Date: Feb 2005
Location: Berkeley, CA
|
Re: Hacking Question
Quote:
Basic Encryption: basic encryption is proof against any reasonable level of effort for known technologies of the same TL. Base complexity to crack it is 12 (at TL 9). Halve complexity for Exotic Codebreakers of the same or higher TL. Secure Encryption: as basic encryption, but complexity is 14 and exotic codebreakers must be higher TL. Exotic Codebreakers: specialized technology designed for cracking encryption. Quantum Computers count as exotic codebreakers at TL 9; higher TL exotics are probably technologies we haven't even got terms for. Assume 'quantum' on a computer just means it's an exotic codebreaker. |
|
|
|