Star Wars Roleplay: Chaos

Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!

Approved Tech Pecheneg Encryption System

Status
Not open for further replies.
Quis custodiet ipsos custodes?
PGP_message.jpg


Image Source: http://upload.wikimedia.org/wikipedia/commons/e/e9/PGP_message.jpg
Intent: To develop a practically unbreakable method of peer-to-peer communication for individuals on the board. Also should help eliminate any chance of godmodding occurring with important information transmitted in-between individuals using the system.
Development Thread: If needed.
Manufacturer: Defiance Consolidated Multipurpose Manufacturing
Model: Pecheneg Encryption System
Affiliation: Open Market
Modularity: Yes(different variants can easily interact with one another)
Production: Mass-Produced
Material: Digital Code
Description: The Pecheneg Encryption System, often known as PES, is a nearly-unbreakable code system developed by Emeritus Industries for in-house communication as well as for peer-to-peer messages via the holonet. When the service is used, the user is given a public and private encryption key. Other users of the PES system can use the public key to send an encrypted message to the individual - who can then use the associated private key in concert with a private password to decrypt the message. Without the password, the private key will not function. Many variants of PES have already been developed for different types of datapad, and all are capable of sending messages to one another that can be decrypted, with no issue between systems.

Two chief issues stand out with the system, however. First, only text messages can be sent this way. Files cannot be encrypted, though they could be sent as such along with a PES-encoded message using third-party encryption software. The latter is that if the datapad the PES private key is stored on is seized, and the password as well is recovered, all messages sent to(but not sent from) the individual's datapad that were encrypted using his or her public key can then be decrypted and examined, rendering the key pairing useless.

Pecheneg variants are finding themselves spreading across the galaxy, with many individuals who value privacy turning to the system as a viable means of private communication.
Modification:
Company and Affiliation change
Original Section(s):

Manufacturer: Subach-Innes

New Section(s):

Manufacturer: Defiance Consolidated Mulitpurpose Manufacturing
 
I'm not too certain if this falls under plagiarism or not, so I'd like to ask that any names or things related to the original wikipedia entry/real world variation are changed or altered to ensure the preservation of trademarked or copyrighted materials.
[member="Enigma"]
 
Quis custodiet ipsos custodes?
[member="Silara"]

They have indeed been altered. Only thing in the sub that's from Wikipedia is the picture in order to give a sample of what a PGP message looks like.
 
Is this open to the public, or used by your company only? You may also want to update this for increases in computer power (brute force) and mathematical capabilities that aren't present in the real world.
[member="Enigma"]
 
Quis custodiet ipsos custodes?
[member="Silara"]

It's open to the public. As for updates in computing power and mathematical capabilities - considering the base standard for generating such keys has been a mathematically random set of data, it would take a long time, even with a supercomputer, to catalog every possible public key, every possible private key, and every possible way the two could interact. They would also need the individual's password assuming they miraculously were able to connect a pair of public and private keys, since without the password, the keys are useless and can't decrypt anything. That's why 'truly random' encryption methods, such as PGP and one-time pads, are considered to be practically unbreakable.
 
Status
Not open for further replies.

Users who are viewing this thread

Top Bottom