Thorns: Uprising - <!-- IF S_IN_MCP -->Moderator Control Panel - <!-- ELSEIF S_IN_UCP -->{ UCP } - <!-- ENDIF -->View topic - Ivan's notes

Thorns: Uprising - View topic - Ivan's notes

Thorns: Uprising - <!-- IF S_IN_MCP -->Moderator Control Panel - <!-- ELSEIF S_IN_UCP -->{ UCP } - <!-- ENDIF -->View topic - Ivan's notes

Thorns: Uprising - View topic - Ivan's notes
It is currently July 25th, 2012, 3:26 am


Forum rules


Transferring Posts

Why is this forum read-only? We are currently transferring all active posts to the new forum. Come into chat or email me (cartographette@gmail.com) if you have any questions. If you'd like to volunteer to help, we could use your assistance!

Welcome to the Character Journals section! This is where you can create an IC journal for each of your PCs, and post your character's letters to other PCs and NPCs. This forum is In Character, so all OOC comments need to be in OOC format.

Please only make one journal per character, and specify in your thread title or your first post if OOC comments are allowed. For letters to other PCs or NPCs, you can make a new thread (you don't have to post them in your journal). Reply letters should be posted in the same thread.



Post new topic Reply to topic  [ 3 posts ] 
 Ivan's notes 
Author Message
"Doctor"
User avatar

Joined: October 6th, 2008, 6:33 am
Posts: 851
Location: London
Real Name: Edward
IC Race: Human
IC Age: 34
IC Gender: Male
Post Ivan's notes
##THESE RECORDS ARE TO BE DESTROYED UPON COMPLETION OF THE RENEWED SECURITY MEASURES. IF THESE RECORDS ARE FOUND FOR WHATEVER REASON, THE READER IS CHARGED TO DESTROY THEM IMMEDIATELY. ##

[the following text is the decoded version of the records]

It is of utmost importance that new security measures be set in place if the resistance is to survive.

Those of my ill fated predecessor were much too weak, and this fact ultimately led to his demise. However, it is not proper to speak ill of the dead, and in his favour he did have one fallback in place; the emergency protocol.

It is a deceptively simple cipher substitution method, primarily to buy time in which to construct countermeasures and to limit the damage of a breach.


Concerning secrecy of great importance, there are a number of factors to consider and strategies at the disposal of the skilled cryptographer.

The primary task is to be able to communicate information clearly and concisely with as little mechanical and mental labour as possible in encoding and decoding. A balance must be struck with complexity, to make a calcualted or a brute force attempt of an unwelcome outsider sufficiently diffcult, or ideally impossible.
But this is only the pre-requisite of an effective codec, and by itself it is next to useless as a security measure.

[end of part 1]

_________________
IC: Ivan Mottoni; OOC: Edward Hicks
cheezopath.com, my deviantart
The Doctor Is In. Body count: 4
I also play Crius Levent and Lochlan Greensmythe


19:02:47 ‹Wendy› where's Ed when I need him god damnit.


Last edited by Ivan Mottoni on October 26th, 2008, 7:09 pm, edited 1 time in total.

October 24th, 2008, 6:18 pm
Profile WWW
"Doctor"
User avatar

Joined: October 6th, 2008, 6:33 am
Posts: 851
Location: London
Real Name: Edward
IC Race: Human
IC Age: 34
IC Gender: Male
Post Re: Ivan's notes
To trust a strong code to protect your secrets is like depending on a great wall to protect a city. While it may initially block all attacks and be tremendously large and intimidating, the wall will surely not be uniformly strong - there will be points that are weaker, and these will be where it is attacked.
And consider the scenario where somehow the wall is breached - what then? Without further measures of defence, at the point the wall is broken, the city is utterly lost.
And think, that in the security world, it is not immediately known wether the wall is breached or not until it is much too late. Truly then, to keep information safe is much like playing a board game in which you, as the player, are neither permitted to see the board nor the pieces and their positions.

What then, can one do, against such relentless and essentially invisible foes?

Firstly it is necesary to compartmentalise information. In an ideal system, all agents are fully trustworthy and impervious to deception and torture, but of course this is never the case. There must therefore be a system in which all information is shared on an absolute "need to know" basis, in a strong heirarchy. It may even be necesary at times to feed false information to allies.
Cases in which this practice are most useful are when the agent in question is known to be under surveillance by the enemy, is suspected to be untrustworthy, or is likely to be captured.
Infact, much energy must be spent spying on those closest to the resistance, particularly in cases of questionable motive.

[end of part 2. Next: effective deployment of codes ]

_________________
IC: Ivan Mottoni; OOC: Edward Hicks
cheezopath.com, my deviantart
The Doctor Is In. Body count: 4
I also play Crius Levent and Lochlan Greensmythe


19:02:47 ‹Wendy› where's Ed when I need him god damnit.


October 26th, 2008, 1:28 pm
Profile WWW
"Doctor"
User avatar

Joined: October 6th, 2008, 6:33 am
Posts: 851
Location: London
Real Name: Edward
IC Race: Human
IC Age: 34
IC Gender: Male
Post Re: Ivan's notes
Broadly speaking, there are two types of secret message - steganographic and cryptographic.

The former entials a method of hiding a message in plain sight, or by some special means that does not necessarily require encryption, while the latter is the classic computational cipher method. There are pros and cons to each method, as with all things, and the importance of knowing which to use in a given situation is not to be underestimated.

A steganographic message carries the advantage that it is publicly deployable. A practical application of this would be to post a personals advert in a newspaper. If the terms applied have a pre-determined meaning known to all concerned, in a day, a brief but important message could in theory be broadcast to every party member with access to the Kingsway Post. There are many other useful steganographical methods, all sharing the advantage that they are not outwardly suspicious and may be safely used in plain sight by any agent.

Cryptographic messages possess qualities of a different nature. They can pass confidently through dubious channels, provided the correct precautions are taken. It is inadvisable, for example, for a party member to be seen posting a letter full of ciphertext - even if the meaning is not discerned, they have already provided more than enough grounds for the seventen to interrogate them. A safer method would be to place agents or acquire agents from within the postal service and through this connection filter messages without return addresses.

If, on its travels, a message is intercepted, the encrypted form of the message (or cipher text) should prove incomprehensible to the interceptor. Assuming the interceptor allows a message to pass, and settles merely to make a copy, hoping to interpret the meaning of it in secret, the strength of the code is then directly put to the test.

[Next: effective deployment of codes continued ]

_________________
IC: Ivan Mottoni; OOC: Edward Hicks
cheezopath.com, my deviantart
The Doctor Is In. Body count: 4
I also play Crius Levent and Lochlan Greensmythe


19:02:47 ‹Wendy› where's Ed when I need him god damnit.


October 30th, 2008, 6:55 pm
Profile WWW
Display posts from previous:  Sort by  
Post new topic Reply to topic  [ 3 posts ] 


Who is online

Users browsing this forum: No registered users and 1 guest


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot post attachments in this forum

Search for:
Jump to:  
cron
Powered by phpBB © phpBB Group.
Designed by Vjacheslav Trushkin for Free Forums/DivisionCore.