Editing Encryption code
From Halopedia, the Halo wiki
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 1: | Line 1: | ||
{{ | {{Era|Human|UNSC|HCW}} | ||
{{ | {{SeeWikipedia|Encryption}} | ||
An '''encryption code''', otherwise known as an '''encryption key''' or an '''encryption scheme''', is a functional parameter of cryptological encoding used for security purposes. | An '''encryption code''', otherwise known as an '''encryption key''' or an '''encryption scheme''', is a functional parameter of cryptological encoding used for security purposes. | ||
==Cryptological theory== | ==Cryptological theory== | ||
Encryption only enables senders with the appropriate decryption devices to read secretive transmissions or documents. Persons or organizations that do not possess the appropriate decryption key to decrypt an encrypted file must result to a battery of cryptological techniques to decrypt files, even using artificial cognitive computation sources as powerful as | Encryption only enables senders with the appropriate decryption devices to read secretive transmissions or documents. Persons or organizations that do not possess the appropriate decryption key to decrypt an encrypted file must result to a battery of cryptological techniques to decrypt files, even using artificial cognitive computation sources as powerful as smart [[Artificial intelligence|AIs]]. | ||
The sender will encrypt a piece and send it to the receiver, and will list both the ''public key'' and ''private key'' of the file. The public key is widely available, and was used to encrypt the file. The private key is available only to the receiver, and is used to decrypt the file.<ref>[[wikipedia:Public-key cryptography|"Public-key cryptography" on Wikipedia, the free encyclopedia]]</ref> | The sender will encrypt a piece and send it to the receiver, and will list both the ''public key'' and ''private key'' of the file. The public key is widely available, and was used to encrypt the file. The private key is available only to the receiver, and is used to decrypt the file.<ref>[[wikipedia:Public-key cryptography|"Public-key cryptography" on Wikipedia, the free encyclopedia]]</ref> | ||
Line 11: | Line 11: | ||
==Covenant usage== | ==Covenant usage== | ||
The Covenant occasionally place advanced encryption on high-importance locked doors within their warships, such as the | The Covenant occasionally place advanced encryption on high-importance locked doors within their warships, such as the [[CCS-class battlecruiser|''CCS''-class battlecruiser]] ''[[Truth and Reconciliation]]''. During the [[Raids on the Truth and Reconciliation|UNSC raid on the battlecruiser]], the Covenant locked the UNSC assault squad in the hangar bays with 128,000-bit modulating encryption<ref>''[[The Truth and Reconciliation]]''</ref> until [[Cortana]] was able to hack the doors to open and let the UNSC forces venture further into the ship. | ||
==UNSC usage== | ==UNSC usage== | ||
Line 17: | Line 17: | ||
===Encryption keys=== | ===Encryption keys=== | ||
*'''None''' - Transmissions without code are not classified at all and can be accessed by anyone at any time. Examples of this include the journals produced by [[UNSC Astrophysics | *'''None''' - Transmissions without code are not classified at all and can be accessed by anyone at any time. Examples of this include the journals produced by [[UNSC Astrophysics]]. | ||
*'''Red''' - This code is used most of the time in military transmissions. Classification can be "Restricted," "Classified," or "Secret". The code is sometimes harder to crack, depending on how complex the scheme of the code can be. Examples of this code include the [[United Nations Space Command Emergency Priority Order 098831A-1|Cole Protocol]]. It was used before or during [[2552]] to encrypt [[UNSC Emergency Priority Order 098831A-1]]. | *'''Red''' - This code is used most of the time in military transmissions. Classification can be "Restricted," "Classified," or "Secret". The code is sometimes harder to crack, depending on how complex the scheme of the code can be. Examples of this code include the [[United Nations Space Command Emergency Priority Order 098831A-1|Cole Protocol]]. It was used before or during [[2552]] to encrypt [[UNSC Emergency Priority Order 098831A-1]]. | ||
*'''Black''' - This higher level code is used for more important and urgent information, which can be classified | *'''Black''' - This higher level code is used for more important and urgent information, which can be classified<ref>'''[[Halo: Ghosts of Onyx]]''', ''page 122''</ref>. | ||
*'''Gamma''' - This is one of the highest level codes. It is used on the most classified information and is likely to be an extremely complex code. It coincided with the classification of "Eyes Only Top Secret." | *'''Gamma''' - This is one of the highest level codes. It is used on the most classified information and is likely to be an extremely complex code. It coincided with the classification of "Eyes Only Top Secret." | ||
===Public keys=== | ===Public keys=== | ||
====Red==== | ====Red==== | ||
*[[file/albatross-seven-lucifer-zeno/]]<ref>'''Halo: Evolutions - Essential Tales of the Halo Universe''', "The Impossible Life and the Possible Death of Preston J. Cole" | *[[file/albatross-seven-lucifer-zeno/]]<ref name="HE">'''[[Halo: Evolutions - Essential Tales of the Halo Universe]]''', "[[The Impossible Life and the Possible Death of Preston J. Cole]]"</ref> | ||
*[[file/bravo-tango-beta-five/]] | *[[file/bravo-tango-beta-five/]] | ||
*[[file/douglas-six-six-lima/]]<ref | *[[file/douglas-six-six-lima/]] | ||
*[[file/ | *[[file/excised access Omega/]]<ref>'''Halo: The Fall of Reach'''</ref> | ||
*[[file/ | *[[file/first light/]]<ref>'''Halo: The Fall of Reach''', ''page 135''</ref> | ||
*[[file/lightning-matrix-four/]]<ref>'''Halo: The Fall of Reach''', ''page 214''</ref> | |||
*[[file/vegas-anaconda-mockingbird-zero/]]<ref | *[[file/vegas-anaconda-mockingbird-zero/]]<ref name="HE"/> | ||
====Black==== | ====Black==== | ||
Line 43: | Line 39: | ||
*[[file/gamma-thunder-twelve]]<ref>'''Halo: Blood Line''', ''[[Halo: Blood Line Issue 1|Issue 1]]''</ref> | *[[file/gamma-thunder-twelve]]<ref>'''Halo: Blood Line''', ''[[Halo: Blood Line Issue 1|Issue 1]]''</ref> | ||
*[[file/rho-hotel-eight/Iona]]<ref>'''Halo: Blood Line''', ''[[Halo: Blood Line Issue 3|Issue 3]]''</ref> | *[[file/rho-hotel-eight/Iona]]<ref>'''Halo: Blood Line''', ''[[Halo: Blood Line Issue 3|Issue 3]]''</ref> | ||
*[[file/seasonal/]] | *[[file/seasonal/]]<ref>'''Halo: Ghost of Onyx''', ''page 122''</ref> | ||
*[[file/zulu-oscar-papa/Iona]]<ref>'''Halo: Blood Line''', ''[[Halo: Blood Line Issue 4|Issue 4]]''</ref> | *[[file/zulu-oscar-papa/Iona]]<ref>'''Halo: Blood Line''', ''[[Halo: Blood Line Issue 4|Issue 4]]''</ref> | ||
====Unknown==== | ====Unknown==== | ||
*[[file/red rover red rover/]] | *[[file/red rover red rover/]] | ||
==List of appearances== | ==List of appearances== | ||
Line 101: | Line 51: | ||
**''[[Halo: Combat Evolved Anniversary]]'' | **''[[Halo: Combat Evolved Anniversary]]'' | ||
*''[[Halo: Ghosts of Onyx]]'' | *''[[Halo: Ghosts of Onyx]]'' | ||
*''[[Halo: Evolutions - Essential Tales of the Halo Universe]]'' | *''[[Halo: Evolutions - Essential Tales of the Halo Universe]]'' | ||
**''[[The Impossible Life and the Possible Death of Preston J. Cole]]'' | **''[[The Impossible Life and the Possible Death of Preston J. Cole]]'' | ||
==Sources== | ==Sources== | ||
<references/> | |||
[[Category:Security technology]] | [[Category:Security technology]] |