Star Wars Roleplay: Chaos

Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!

Approved Tech ECHO Copycat: Kaleido

Status
Not open for further replies.
Intent: To build upon the previous Copycat: Hallucin concept and add the anticipated comms frequency decryption system.
Development Thread: [None]
Manufacturer: ECHO Esprit
Model: ECHO Copycat Mk 2: Kaleido
Affiliation: The Rebel Alliance
Modularity: No
Production: Minor
Material: Ferrocarbon housing; Crodium interior; Halurium backup independent power source
Description: Kaleido is the second-tier model of the Copycat series, adding an extra layer to the Mk 1’s capabilities in scope confusion. It performs all the same IFF-bounce functions featured in the standard Hallucin model, and also comes with the same caveats related to the IFF-bounce functions. It also comes with a larger pricetag.

The physical device is rectangular, measuring at 10.5cm x 5.25cm X 1cm. A halurium-grain power source enables the Kaleido hardware to continue functioning for a period even after power to non-essential systems has been cut, potentially saving pilots' lives in desperate situations. The interior mechanisms do protect from power surges but, unfortunately, the housing does not shield from EMP.

What makes the Kaleido model a step up from the original Hallucin model is its comms channel decryptor, capable of intercepting enemy radio chatter and allowing the pilot to listen in. It processes radio wave frequencies detected and isolates the constant signals, thereby eliminating 'noise' from most natural emitters, such as local stars and various weather phenomena. After the more conspicuous signals have been isolated, rapidly shifting algorithm patterns are tried, beginning with the most simple encryption patterns and inversions. The device is fairly effective against commercially available, civilian-grade encryption where both the key generate/exchange mechanism and algorithms are known. It has a very low probability of breaking into military-grade encryption. In this instance the device will often be used for recording and pre-processing, so that received communications can be analysed in slow-time by a dedicated cyber warfare group.

Additionally, a new ‘save’ feature stores rebounded IFF signals so the craft can emit the signals on later missions without requiring signal contact with the source enemy craft, enabling craft with the Mk 2 device to perform isolated operations under digital disguise.

Copycat: Kaleido is simply hooked up to the main sensory, transmission, and HUD systems of a small craft and does its work.
 
[member="Geneviève Lasedri"]

So, love the original concept.

However, I don't like the carte blanche approach to decryption. It seems open to abuse.

Also you generally either need the keys, or a mathematically broken crypto algorithm to easily decrypt. In either case the enemy can simply change they keys or move onto a stronger algorithm. Without this decryption is always a much more arduous task and difficult to apply "on the fly" especially with limited computational resources in a small box.

Could you add a bit more on how this works and perhaps think of a way to limit this to make reduce the potential for power gaming?
 
Thanks for the effort so far. Afraid I’m going to make the following suggestion to make the limitations more clear:

The device is fairly effective against commercially available, civilian-grade encryption where both the key generate/exchange mechanism and algorithms are known. It has a very low probability of breaking into military-grade encryption. In this instance the device will often be used for recording and pre-processing, so that received communications can be analysed in slow-time by a dedicated cyber warfare group.
Rationale: Military grade encryption will be designed to be intercepted and analysed by dedicated EM-warware ships with masses of databanks churning and trying to crack in. It’s too much to have a tiny box in a fighter with the capability.

I’d suggest, in a military context, that you record some data from an enemy. Do a development thread afterwards explaining how you break the crypto, and then have a one-shot weapon for the next engagement where you take them by surprise by cracking their comms.
 
Status
Not open for further replies.

Users who are viewing this thread

Top Bottom