Public Key Encryption

Basic Information

Public-key cryptography, also known as asymmetric cryptography, is a form of cryptography in which the key used to encrypt a message differs from the key used to decrypt it. In public key cryptography, a user has a pair of cryptographic keys—a public key and a private key. The private key is kept secret, while the public key may be widely distributed. Incoming messages would have been encrypted with the recipient's public key and can only be decrypted with his corresponding private key. The keys are related mathematically, but the private key cannot be practically derived from the public key.

Sources

Wikipedia Link

Game and Story Uses

Fantasy

  • In a high-magic setting, a similar principle on a magical basis could easily be used by magicians and wizards to keep their writings and communications secure.
    • One could even use spirits or magically self-encrypting messages to secure messages.
    • Like the "Teleport codes" of D&D4, a setting might include public communication centers where people deposit their communication codes and public keys so that random travelling adventures can still be reached securely while in the dungeon.
  • Demons are generally summoned by various rituals, often found in dusty tomes and such. In a way, these could be considered "public keys" to secure any attempt to reach the demon or keep his enemies from intercepting and possibly redirecting invocations.
    • The same goes for prayers, really.
    • This would be especially appropriate in a "War in Heaven/Hell" scenario where there is active antagonism between the various supernatural parties.

Science Fiction

  • Asymmetric Encryption is often only as secure as the password that protects the users secret key (Which might be stolen by carious means.), which makes it attackable by various social and technological means.
    • This might mean that the easiest way to get at a the Cleartext of an encrypted message is to get the user to tell you his password,either by force or regular social engineering. Characters might have to abduct somebody with the appropriate password to "break" the encryption.
  • Encryption is secure because the range of possible key values is too big to calculate in a reasonable time frame with current computers. Advances in technology might lead to ways to reduce this time frame to something usable, thus leading to adventures centered on a new McGuffin that might make any current encryption scheme easily breakable.
    • Alternatively, claiming to have developed such a McGuffing, even if not true, could be a powerful possibility for fraud or intimidation by the characters.
  • Asymmetric Encryption also includes ways to sign messages, this making clear that they are really coming from a specific key the target knows. This could be an easy way to make sure that the sender is really who he claims to be, even when he sends through various anonymous ways.
    • So an AI or other "mysterious contact" that uses various unconnected means to contact the PCs could sign his messages to proof that they are really coming from the same … being.
    • Alternatively, breaking a key or otherwise getting control of it is a great way to assume a persons identity at least as long as that person has no other way to retract that key or contact the target. (Though disconnection of communication services, abduction or death.)
Unless otherwise stated, the content of this page is licensed under Creative Commons Attribution-ShareAlike 3.0 License