Encryption code: Difference between revisions
From Halopedia, the Halo wiki
Halopediaman (talk | contribs) m (This belongs here too.) |
mNo edit summary |
||
Line 1: | Line 1: | ||
{{Era| | {{Era|Human|UNSC|HCW|RW}} | ||
{{ratings}} | {{ratings}} | ||
{{SeeWikipedia|Encryption}} | {{SeeWikipedia|Encryption}} | ||
Line 5: | Line 5: | ||
==Cryptological Theory== | ==Cryptological Theory== | ||
Encryption only enables senders with the appropriate decryption devices to read secretive transmissions or documents. Persons or organizations that do not possess the appropriate decryption key to decrypt an encrypted file must result to a battery of cryptological techniques to decrypt files, even using artificial cognitive computation sources as powerful as smart [[AI]]s. | Encryption only enables senders with the appropriate decryption devices to read secretive transmissions or documents. Persons or organizations that do not possess the appropriate decryption key to decrypt an encrypted file must result to a battery of cryptological techniques to decrypt files, even using artificial cognitive computation sources as powerful as smart [[AI]]s. | ||
The sender will encrypt a piece and send it to the receiver, and will list both the ''public key'' and ''private key'' of the file. The public key is widely available, and was used to encrypt the file. The private key is available only to the receiver, and is used to decrypt the file.<ref>[[wikipedia:Public-key cryptography|"Public-key cryptography" on Wikipedia, the free encyclopedia]]</ref> | The sender will encrypt a piece and send it to the receiver, and will list both the ''public key'' and ''private key'' of the file. The public key is widely available, and was used to encrypt the file. The private key is available only to the receiver, and is used to decrypt the file.<ref>[[wikipedia:Public-key cryptography|"Public-key cryptography" on Wikipedia, the free encyclopedia]]</ref> | ||
Line 15: | Line 15: | ||
==UNSC Usage== | ==UNSC Usage== | ||
Encryption is placed on [[UNSC]] documentation or transmissions in order to maintain the level of secrecy demanded by the [[Transmission Classification]]. Encryption codes, like classifications, come in varying types, based on the importance of the information in the file. | Encryption is placed on [[UNSC]] documentation or transmissions in order to maintain the level of secrecy demanded by the [[Transmission Classification]]. Encryption codes, like classifications, come in varying types, based on the importance of the information in the file. | ||
===Encryption Keys=== | ===Encryption Keys=== | ||
Line 32: | Line 32: | ||
*file/seasonal/<ref>'''Halo: Ghost of Onyx''', page 122</ref> | *file/seasonal/<ref>'''Halo: Ghost of Onyx''', page 122</ref> | ||
*file/excised access Omega/<ref>'''Halo: The Fall of Reach'''</ref> | *file/excised access Omega/<ref>'''Halo: The Fall of Reach'''</ref> | ||
==List of appearances== | |||
*[[Halo: Combat Evolved]] {{1st}} | |||
*[[Halo: The Fall of Reach]] | |||
*[[Halo: Ghosts of Onyx]] | |||
==Sources== | ==Sources== |
Revision as of 15:08, September 12, 2010
Template:Ratings Template:SeeWikipedia An Encryption Code, otherwise known as an Encryption Key or an Encryption Scheme, is a functional parameter of cryptological encoding used for security purposes.
Cryptological Theory
Encryption only enables senders with the appropriate decryption devices to read secretive transmissions or documents. Persons or organizations that do not possess the appropriate decryption key to decrypt an encrypted file must result to a battery of cryptological techniques to decrypt files, even using artificial cognitive computation sources as powerful as smart AIs.
The sender will encrypt a piece and send it to the receiver, and will list both the public key and private key of the file. The public key is widely available, and was used to encrypt the file. The private key is available only to the receiver, and is used to decrypt the file.[1]
The Covenant and the United Nations Space Command both use encryption devices to hide military tactics and orders.
Covenant Usage
The Covenant occasionally place advanced encryption on high-importance locked doors within their warships, such as the CCS-class Battlecruiser Truth and Reconciliation. During the UNSC raid on the battlecruiser, the Covenant locked the UNSC assault squad in the hangar bays with 128,000-bit modulating encryption[2] until Cortana was able to hack the doors to open and let the UNSC forces venture further into the ship.
UNSC Usage
Encryption is placed on UNSC documentation or transmissions in order to maintain the level of secrecy demanded by the Transmission Classification. Encryption codes, like classifications, come in varying types, based on the importance of the information in the file.
Encryption Keys
- None - Transmissions without code are not classified at all and can be accessed by anyone at any time. Examples of this include the journals produced by UNSC Astrophysics.
- Red - This code is used most of the time in military transmissions. Classification can be "Restricted," "Classified," or "Secret". The code is sometimes harder to crack, depending on how complex the scheme of the code can be. Examples of this code include the Cole Protocol. It was used before or during 2552 to encrypt UNSC Emergency Priority Order 098831A-1.
- Black - This higher level code is used for more important and urgent information, which can be classified[3].
- Gamma - This is one of the highest level codes. It is used on the most classified information and is likely to be an extremely complex code. It coincided with the classification of "Eyes Only Top Secret."
Public Keys
- file/bravo-tango-beta-five/
- file/first light/[4]
- file/lightning-matrix-four/[5]
- file/seasonal/[6]
- file/excised access Omega/[7]
List of appearances
- Halo: Combat Evolved (First appearance)
- Halo: The Fall of Reach
- Halo: Ghosts of Onyx
Sources
- ^ "Public-key cryptography" on Wikipedia, the free encyclopedia
- ^ The Truth and Reconciliation
- ^ Halo: Ghosts of Onyx, page 122
- ^ Halo: The Fall of Reach, page 135
- ^ Halo: The Fall of Reach, page 214
- ^ Halo: Ghost of Onyx, page 122
- ^ Halo: The Fall of Reach