<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>jhunterj.com &#187; gurps</title>
	<atom:link href="http://jhunterj.com/tag/gurps/feed/" rel="self" type="application/rss+xml" />
	<link>http://jhunterj.com</link>
	<description>J. Hunter Johnson—I&#039;m just this geek you (should) know.</description>
	<lastBuildDate>Sat, 14 Mar 2015 12:10:39 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=3.9.40</generator>
	<item>
		<title>The Persistence of Memory in the Digital Age</title>
		<link>http://jhunterj.com/2013/05/30/the-persistence-of-memory-in-the-digital-age/</link>
		<comments>http://jhunterj.com/2013/05/30/the-persistence-of-memory-in-the-digital-age/#comments</comments>
		<pubDate>Thu, 30 May 2013 10:44:47 +0000</pubDate>
		<dc:creator><![CDATA[Hunter]]></dc:creator>
				<category><![CDATA[Science]]></category>
		<category><![CDATA[dave arneson]]></category>
		<category><![CDATA[gurps]]></category>
		<category><![CDATA[gurps civil war]]></category>
		<category><![CDATA[settlers of catan]]></category>
		<category><![CDATA[summation]]></category>

		<guid isPermaLink="false">http://jhunterj.com/?p=81</guid>
		<description><![CDATA[There&#8217;s a blog post out on Summation.net from a few years back about the erosion of online anonymity: &#8220;The Erosion of Online Anonymity (and How to Restore It)&#8221; Back then, I tweeted the blog post along and forwarded to the <a class="more-link" href="http://jhunterj.com/2013/05/30/the-persistence-of-memory-in-the-digital-age/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>There&#8217;s a blog post out on Summation.net from a few years back about the erosion of online anonymity: &#8220;<a href="http://blog.summation.net/2010/09/the-erosion-of-online-anonymity-and-how-to-restore-it.html" target="_blank">The Erosion of Online Anonymity (and How to Restore It)</a>&#8221;</p>
<p>Back then, I tweeted the blog post along and forwarded to the guys at Catan LLC, since they love seeing Catan mentioned in non-game-industry media. I also commented on the story there.</p>
<div style="width: 224px" class="wp-caption alignright"><a href="http://www.flickr.com/photos/usba/5652805681/"><img class=" " alt="Forget-Not by Z Joya, on Flickr" src="http://farm6.staticflickr.com/5303/5652805681_cc2520455f.jpg" width="214" height="300" /></a><p class="wp-caption-text">Forget-Not by Z Joya, on Flickr (<a href="http://creativecommons.org/licenses/by-nc-sa/2.0/">BY-NC-SA</a>)</p></div>
<p>I love this topic. My own epiphany in digital memory came back when I was trying to figure out if I was going to work with <a href="http://en.wikipedia.org/wiki/Dave_Arneson" target="_blank">Dave Arneson</a> on <em>GURPS Civil War</em>. (This was a long time ago; Dave has since died, and <em>GURPS Civil War</em> never came off, and <a href="http://www.sjgames.com/general/guidelines/authors/capsules.html" target="_blank">the page soliciting it</a> has been doing so since 2003.) So some time in those dark ages of online search, I happened across a message board archive (maybe Usenet, maybe some BBoard emulation) where a poster mentioned working with Dave, and I reached out to him about the experience. I don&#8217;t remember how he felt about working with Dave, but I distinctly remember his initial rejoinder: The Internet means never having to say &#8220;I don&#8217;t recall.&#8221;</p>
<p>Probably there are things that have disappeared from (or &#8220;been forgotten by&#8221;) the digital hivemind. But you&#8217;d be hard-pressed to guarantee that a particular bit of tid is nowhere to be found anymore. This knowledge is why it&#8217;s sometimes hard to watch action soap operas like <em><a href="http://amzn.to/148hFVg" target="_blank">24</a>. </em>If you have a video incriminating the very powerful person and want to get the story out, just upload it.</p>
<p>There are some great thinkers thinking interesting things about what it means to be able to remember everything virtually these days, and what it means not being able to be forgotten. If you haven&#8217;t read all of these, they cover some good ground &#8212; this in basically my order of enjoyment:</p>
<ul>
<li><a href="http://amzn.to/13jVMn0" target="_blank"><em>Total Recall: How the E-Memory Revolution Will Change Everything</em></a>, by Gordon Bell &amp; Jim Gemmell</li>
<li><a href="http://amzn.to/10IWLv5" target="_blank"><em>Ambient Findability</em></a>, by Peter Morville</li>
<li><a href="http://amzn.to/13jVOev" target="_blank"><em>Delete: The Virtue of Forgetting in the Digital Age</em></a>, by Viktor Mayer-Schonberger.</li>
</ul>
<p>The last book in particular ends with a fizzle, since I don&#8217;t think much of the plausibility of his solutions. But it was worth reading for the investigation of the problem.</p>
<p>I&#8217;ve also been reading some interesting things in &#8220;Data Finds Data&#8221; (Jonas &amp; Sokol, in <a href="http://amzn.to/13jWu3H" target="_blank"><em>Beautiful Data</em></a>).</p>
<p style="text-align: right;">—jhunterj</p>
]]></content:encoded>
			<wfw:commentRss>http://jhunterj.com/2013/05/30/the-persistence-of-memory-in-the-digital-age/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Monsters on the Virtual Prowl</title>
		<link>http://jhunterj.com/2013/05/02/monsters-on-the-virtual-prowl/</link>
		<comments>http://jhunterj.com/2013/05/02/monsters-on-the-virtual-prowl/#comments</comments>
		<pubDate>Thu, 02 May 2013 16:20:44 +0000</pubDate>
		<dc:creator><![CDATA[Hunter]]></dc:creator>
				<category><![CDATA[Gaming]]></category>
		<category><![CDATA[Writing]]></category>
		<category><![CDATA[gurps]]></category>
		<category><![CDATA[gurps monsters]]></category>

		<guid isPermaLink="false">http://jhunterj.com/?p=365</guid>
		<description><![CDATA[Another of my GURPS books made the jump  to PDF from e23: GURPS Monsters can now be yours in instant download from: http://e23.sjgames.com/item.html?id=SJG30-6418 It just went &#8220;live&#8221; on April 25 and has been selling briskly, as far as my experience <a class="more-link" href="http://jhunterj.com/2013/05/02/monsters-on-the-virtual-prowl/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<div style="width: 241px" class="wp-caption alignright"><a href="http://e23.sjgames.com/item.html?id=SJG30-6418"><img alt="GURPS Monsters cover" src="http://e23.sjgames.com/media/SJG30-6418.jpg" width="231" height="300" /></a><p class="wp-caption-text">GURPS Monsters</p></div>
<p>Another of my <em>GURPS</em> books made the jump  to PDF from e23: <em>GURPS Monsters</em> can now be yours in instant download from: <a href="http://e23.sjgames.com/item.html?id=SJG30-6418">http://e23.sjgames.com/item.html?id=SJG30-6418</a></p>
<p>It just went &#8220;live&#8221; on April 25 and has been selling briskly, as far as my experience goes (which is not very far, admittedly). Enough so that in that handful of days, it pushed my royalties into the &#8220;cut a check&#8221; level all by itself, when otherwise orders for my previous books trickled in to get me a check every handful of quarters. So, good times, thank you, and go help out my May numbers if you don&#8217;t have yours yet!</p>
<p>Not convinced? There&#8217;s a 10-page preview available there as well, to try before you buy, and my <a href="http://www.sjgames.com/pyramid/sample.html?id=2505" target="_blank">designer&#8217;s notes</a> are freely available on Pyramid. Or if you&#8217;d prefer the physical book, there are a <a href="http://www.sjgames.com/gurps/books/monsters/" target="_blank">limited number of those</a> left too. (You can order it used or new from Amazon as well: <a href="http://amzn.to/Pg0NJT" target="_blank"><em>GURPS Monsters</em></a>; but today&#8217;s prices make that seem unlikely.)</p>
<p style="text-align: right;">—jhunterj</p>
]]></content:encoded>
			<wfw:commentRss>http://jhunterj.com/2013/05/02/monsters-on-the-virtual-prowl/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>GURPS Cryptology</title>
		<link>http://jhunterj.com/2013/04/10/gurps-cryptology/</link>
		<comments>http://jhunterj.com/2013/04/10/gurps-cryptology/#comments</comments>
		<pubDate>Wed, 10 Apr 2013 11:45:51 +0000</pubDate>
		<dc:creator><![CDATA[Hunter]]></dc:creator>
				<category><![CDATA[Gaming]]></category>
		<category><![CDATA[cryptology]]></category>
		<category><![CDATA[cyberpunk]]></category>
		<category><![CDATA[gurps]]></category>

		<guid isPermaLink="false">http://jhunterj.com/?p=321</guid>
		<description><![CDATA[Another article resurrected from my previous website. This was intended to be an article for Pyramid magazine, but was too dry or too long for acceptance there. I&#8217;ve never updated it for GURPS 4th Edition. (Perhaps playes of that system could tell <a class="more-link" href="http://jhunterj.com/2013/04/10/gurps-cryptology/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>Another article resurrected from my previous website. This was intended to be an article for <em>Pyramid </em>magazine, but was too dry or too long for acceptance there. I&#8217;ve never updated it for <a href="http://amzn.to/17otdbt" target="_blank"><em>GURPS 4th Edition</em></a>. (Perhaps playes of that system could tell me what would need to be changed.)</p>
<p style="text-align: right;">for <em>GURPS 3rd Edition</em> rules</p>
<p style="padding-left: 30px;"><i>Witeout was pretty far gone into Rio Largo&#8217;s main databank. He&#8217;d been in for over 10 seconds already, and time was running out. If only his Spanish was better! This was his first foreign run, and for the proggies, natch. The Chilentinan&#8217;</i><i>s were doin&#8217; some research in Antarctica, and Uncle Adam wanted to know whether it was bolshy or faex.</i></p>
<p style="padding-left: 30px;"><i>Bingo! Well, maybe bingo. Witeout found a file tagged &#8216;Antarctica&#8217; but inside was shash data. Encrypted, drig! Better than nothin&#8217;, though, and it was too hot to hang around. Witeout slipped back through the Net to the good ol&#8217; U. S. of A.</i></p>
<p>&#8220;All right, let&#8217;s hope it&#8217;s a simple cipher,&#8221; says Brian, Witeout&#8217;s player, looking up from his copy of <a href="http://amzn.to/YeqBKZ" target="_blank"><em>GURPS Cyberpunk</em></a>. &#8220;My Computer Programming is 17, so with the −6, I should get the real data on an 11 or less.&#8221;</p>
<p>&#8220;What does Computer Programming have to do with breaking codes, Brainiac? I found what you need here in <a href="http://amzn.to/Zzva4k" target="_blank"><em>High-Tech</em></a>. See, roll against Mathematics−2 or IQ−8.&#8221;</p>
<p>&#8220;C&#8217;mon, Cryptography is in <a href="http://amzn.to/10E3GHN" target="_blank"><em>Terradyne</em></a>. Hold on, I&#8217;ll look it up. (flip, flip, flip.) Here it is: Cryptography, mental hard, defaults to Mathematics−5 or IQ−6. Hmmm, but you get a +2 for simple ciphers.&#8221;</p>
<p>The GM cuts to the chase. &#8220;We&#8217;re going with what&#8217;s in the <em>Basic Set</em>. It&#8217;s got Cryptanalysis at Mathematics−3 or IQ−5. Your IQ is 13, so roll an 8 or less.&#8221;</p>
<p>Mark, playing the troop&#8217;s chiller, tries to decide which PC to zero first.</p>
<h2>GURPS 3rd Ed Rules</h2>
<p>Many <em>GURPS</em> books make reference to codes and ciphers. If they mention a skill to be used, it is variously called Cryptanalysis, Cryptography, or Cryptology. Its defaults vary widely, from Mathematics −2 to −5, IQ −5 to −8, or Computer Programming −6. Sometimes it&#8217;s a /TL skill, sometimes it isn&#8217;t. Not particularly universal, is it?</p>
<h2>General Cryptology</h2>
<h3>Definition of Terms</h3>
<p>First, the terms need to be defined. Cryptology is the combination of cryptography and cryptanalysis, cryptography is the creation of cipher and code methodologies, and cryptanalysis is the set of methodologies for obtaining plaintext from ciphertext without the proper keys. What that boils down to is cryptographers figure out how to encode stuff, cryptanalysists try to break the code, and cryptologists study both activities. A cryptosystem is what the cryptographer produces and what the cryptanalysist tries to defeat.</p>
<p>A cryptosystem can be secure (unlikely that anyone without the key can obtain any part of the original message) in two ways. If it is secure in the information-theoretic sense, then no amount of computational power and clever approaches can ever yield the original message. This is usually an impossible level of security to obtain. More often, a cryptosystem attempts to be secure in the computationally feasible sense, so that original messages cannot be obtained with any reasonable amount of computation.</p>
<p>There are other related activities. Cryptanalysis and cryptography are two opposing components of the opposing methods of signal intelligence and signal security (or SIGINT for those of you with <a href="http://amzn.to/10JenXS" target="_blank"><em>GURPS Special Ops</em></a>). These signals come in two varieties, communication and electronic.</p>
<p>Communication security can involve steganography, traffic security, and cryptography. Steganography is the set of methodologies for concealing the fact that a message is being sent. It includes things like invisible inks, microdots, and hiding messages in background noise. Traffic security involves keeping information from being derived from the patterns of communication traffic. For example, dummy messages can be sent so that when the time comes to send a large number of real messages, it doesn&#8217;t seem as unusual.</p>
<p>Communication intelligence includes interception and direction-finding, traffic analysis, and cryptanalysis. Interception and direction-finding try to defeat steganography by obtaining the message or the source of the message, respectively. Traffic analysis tries to deduce facts from patterns of communication traffic.</p>
<p>Electronic security can involve emission security and counter-countermeasures. Emission security is simply the electronic version of steganography—trying to keep the adversary from becoming aware that electronic signals are being used, for example, by shifting radar frequencies. Counter-countermeasures are used to successfully send electronics signals when the adversary is using countermeasures to prevent them from being successfully transmitted.</p>
<p>Electronic intelligence includes electronic reconnaissance and countermeasures. Electronic reconnaissance involves interception and direction-finding, just like with communication intelligence. Countermeasures include techniques like radar jamming and sending false radar echoes.</p>
<h3>Historical Cryptology</h3>
<p>Cryptography has existed since the fifth century B.C. when the Spartans developed and used a transposition cipher (in which the letters of the message are rearranged). Cryptanalysis is much younger. The Arabians were the first to document their cryptanalytic methods, in an encyclopedia completed in 1412.</p>
<div style="width: 307px" class="wp-caption alignright"><a href="http://commons.wikimedia.org/wiki/File:US_Navy_Cryptanalytic_Bombe.jpg"><img class=" " alt="A US Navy WAVE sets the Bombe rotors prior to a run" src="http://upload.wikimedia.org/wikipedia/commons/thumb/9/94/US_Navy_Cryptanalytic_Bombe.jpg/297px-US_Navy_Cryptanalytic_Bombe.jpg" width="297" height="240" /></a><p class="wp-caption-text">A US Navy WAVE sets the Bombe rotors prior to a run. Photo by J Brew (<a href="http://creativecommons.org/licenses/by-sa/2.0/" target="_blank">CC-BY-SA-2.0</a>)</p></div>
<p>Cryptology made intermittent gains through its lifetime. Advances in other fields sometimes lead to these gains. The use of radio communications in World War I led to the growth of cryptology into a mature science. The development of powerful computers in the 1960s made some of the complex modern protocols feasible. The development of public-key cryptography in the late 1970s stimulated academic interest, since it could be widely used in non-military situations. (Public-key cryptography involves two keys, the public key for encoding and the private key for decoding.) One of the most recent advances uses quantum mechanics and Heisenberg&#8217;s uncertainty principle to send messages encoded in beams of polarized light.</p>
<h2>GURPS Rules</h2>
<h3>Character Types</h3>
<dl>
<dt>Chemist/Computer Programmer/Engineer/Gadgeteer/Physicist</dt>
<dd>This group of character types can have some impact on the development of new methods of signal security and signal intelligence, such as invisible inks, password programs, cipher wheels, and quantum encryption devices.</dd>
<dd>Most of these scientists may find it useful to know Signal Security or Signal Intelligence. These are not required as long as someone else (with the appropriate skill) is handy to specify what needs to be developed.</dd>
<dt>Cinematic Spy</dt>
<dd>The master-of-all-trades superspy certainly needs to include Cryptography in his repertoire, and probably Signal Security as well. If the Bad Guys are taking steps to keep the Important Information from the Superspy, he would do well to have Signal Intelligence and Cryptanalysis as well.</dd>
<dt>Cipher Clerk</dt>
<dd>Unlikely choices for PCs in a heroic campaign, these individuals held important positions nonetheless. Simple mistakes in their daily tasks could provide the enemy with invaluable information. They all must have Professional Skill: Cipher Clerk.</dd>
<dt>Conspirator/Diplomat/Paranoid/Scribe/Telegraph Operator</dt>
<dd>These are the character types that may routinely use cryptographic protocols in their lines of work. Even if they don&#8217;t know the science of Cryptology, many should have the Professional Skill of Cipher Clerk, so that they can send and receive secure messages with some degree of success.</dd>
<dt>Femme Fatale</dt>
<dd>As pointed out in <a href="http://amzn.to/Yer9kb" target="_blank"><em>GURPS Espionage</em></a>, the femme fatale need not be a female. In espionage, these manipulators will often need to send reports or receive instructions while in the, ahem, company of important figures. Even apart from the spy world, cryptology can be handy for secret lovers—Vatsyayana&#8217;s <a href="http://amzn.to/16LVWDX" target="_blank"><em>Kama-sutra</em></a> lists secret writing as one of the 64 yogas that women should know.</dd>
<dt>Historian/Theologian</dt>
<dd>Occasionally a researcher finds an encrypted historical or theological text. Most often they will only study cryptology on the job—working with more experienced cryptanalysists as the need arises.</dd>
<dt>Intelligence Analyst/Black Chamber Member/Government Investigator/Intelligence Officer</dt>
<dd>Intelligence Analyst is the generic category that all of these character types fall into. Signals are intercepted and read without the sender or recipient realizing what was going on.</dd>
<dd>Black Chambers were the NSAs of their time, intelligence-gathering entities operating in peacetime. Mail from one European country to another would be opened by members of the Black Chamber, read, resealed, and delivered. If the message inside was encrypted, it would be held long enough to decrypt it. As modern diplomatic methods evolved, so did modern cryptographic methods evolve in the Black Chambers.</dd>
<dd>Black Chambers were common in Europe in the 1700s. Russia established one as well, the <em>Spets-Otdel</em>, during the reign of Peter the Great. England&#8217;s Black Chamber, Austria&#8217;s <em>Geheime Kabinets-Kanzlei</em>, and France&#8217;s <em>Cabinet Noir</em> all stopped operations in the 1850s, mostly because of public opinion. The United States also operated a Black Chamber after a success with cryptolologic service in World War I. The American Black Chamber was in operation from 1919 to 1929.</dd>
<dd>These other character types do the same kind of work, just in different arenas. Government Investigators would work within a government, possibly as Internal Affairs. Intelligence Officers are military officers who do their work in wartime, intercepting enemy communications. These characters would be skilled in Cryptography, Forgery, Languages, and Signal Intelligence.</dd>
<dt>Mage</dt>
<dd>In a world where magical spells are closely guarded secrets, mages would need cryptology the same way nations do. They would want to keep their knowledge hidden while learning the knowledge that their neighbors possess. See below for an example of a mage using cryptography as part of a security plan for his grimoire.</dd>
<dt>Netrunner</dt>
<dd>Some netrunners may need to act as intelligence analysts. They can either use an expert system or take the do-it-yourself approach. Most netrunners will not have security clearance to come by either option legitimately, but there is always the black market (or a good character story and Unusual Background).</dd>
</dl>
<h3>New Skills</h3>
<dl>
<dt>Cryptology/TL (Mental/Very Hard) No default</dt>
<dd>This is the science of textual information security. It allows the use of both the Cryptography and Cryptanalysist skills below. If the GM wishes to retain the simplified one-skill mechanic for this avenue of study, he should ignore Cryptography and Cryptanalysis and permit players to purchase only Cryptology. Mathematical Ability will add to this skill.</dd>
<dd>Cryptological training requires a Top Secret/Special Compartmentalized Intelligence Clearance in the modern U.S. and similar clearances in other settings. No one with disadvantages that would make him a potential security risk is likely to be selected for such training. An Unusual Background or other Advantage that the GM allows may be substituted for this clearance. Cryptology may be learned at lower TLs without the clearance or other explanation—it is assumed that earlier methods are publicly documented.</dd>
<dd>Historical note: the bonus from Mathematical Ability would be unavailable in the &#8216;real&#8217; world until 1920, when William Frederick Friedman&#8217;s <a href="http://amzn.to/10JdZc6" target="_blank"><em>The Index of Coincidence and Its Applications in Cryptography</em></a> was published. Friedman was the first to apply statistical concepts to the letter frequency distributions used in cryptologic techniques.</dd>
<dt>Cryptography/TL (Mental/Hard) Defaults to Cryptology</dt>
<dd>Cryptography is the science of developing code and cipher protocols and techniques. It allows the creation of new methods of encipherment, and the selection of appropriate techniques and combinations of techniques to define a protocol for a given security need. Mathematical Ability will add to this skill.</dd>
<dd>Cryptographical training requires a Top Secret/Special Compartmentalized Intelligence Clearance in the modern U.S. and similar clearances in other settings. No one with disadvantages that would make him a potential security risk is likely to be selected for such training. An Unusual Background or other Advantage that the GM allows may be substituted for this clearance. Cryptology may be learned at TLs lower than the current TL without the clearance or other explanation—it is assumed that earlier methods are publicly documented.</dd>
<dt>Cryptanalysis/TL (Mental/Hard) Defaults to Cryptology</dt>
<dd>Cryptanalysis is the science of obtaining plaintext from ciphertext without the proper keys. Computer equipment is extremely helpful, if available, in conjunction with this skill. The availability of other plaintext/ciphertext pairs in the same cryptosystem is an asset; however, message brevity is a serious impediment by even the most skilled cryptanalysist. Mathematical Ability will add to this skill.</dd>
<dd>Cryptanalytical training requires a Top Secret/Special Compartmentalized Intelligence Clearance in the modern U.S. and similar clearances in other settings. No one with disadvantages that would make him a potential security risk is likely to be selected for such training. An Unusual Background or other Advantage that the GM allows may be substituted for this clearance. Cryptology may be learned at TLs lower than the current TL without the clearance or other explanation—it is assumed that earlier methods are publicly documented.</dd>
<dd>Computer modifiers: +Complexity of the decryption program, with a successful Computer Operations roll.</dd>
<dd>Other modifiers: +5 for a known plaintext/ciphertext pair in the same cryptosystem. −10 for a message of a single word, −9 for fewer than 5 words, −7 for fewer than 10 words, −5 for fewer than 25 words, −3 for fewer than 50 words, −1 for fewer than 100 words, +1 for more than 150 words, +3 for more than 300 words, +5 for more than 500 words. Additional modifiers may be made based on the cryptosystem. [This skill originally appeared, in a different form, in <em>GURPS Special Ops</em>.]</dd>
<dt>Hobby Skill: Cryptogram Solving (Mental/Easy) Defaults to Language−4*, Cryptology+2, or Cryptanalysis+2</dt>
<dd>This is the ability to solve simple substitution ciphers, such as those published in puzzle magazines. Mathematical ability will add to this skill.</dd>
<dd>Note to GMs: Simple substitution ciphers are never used in modern times to secure important information. They are used to make information mildly inconvenient to obtain, or to provide a small delay if the information needs to remain unknown for only a short time. For example, some postings on the Internet&#8217;s newsgroups are encrypted using a method known as rot-13, where each letter is replaced by the letter 13 places away in the alphabet. It can be decrypted through the same method, and many newsreaders provide that method of decryption. No one expects the information to remain undeciphered, but it does allow the distribution of information that some members of the audience may not want to read immediately, such as movie spoilers, joke punchlines, or off-color remarks.</dd>
<dd>Note: This skill is not historically available until TL4. During medieval times, cryptology was considered a black art, like witchcraft. The ability to produce real information from a jumble of meaningless letters was viewed as divination.</dd>
<dd>*The default to a language skill should only be allowed in game worlds where cryptogram puzzles are common.</dd>
<dt>Professional Skill: Cipher Clerk/TL (Mental/Easy) Defaults to IQ−4, Cryptology−2, Cryptanalysis−2, or Special</dt>
<dd>This is the ability to use cipher equipment and to follow the appropriate methodologies for encoding and decoding transmissions given the proper keys. In a modern setting, using a computer-program-based encryption protocol with standard documentation, this could also default to Computer Operation−2.</dd>
<dt>Signal Security/TL (Mental/Average) No default</dt>
<dd>The Signal Security skill includes the areas of steganography, transmission and emission security, and traffic security (note that &#8216;signal&#8217; can mean any type of information transfer). Steganography is used to hide the fact that a message is being sent at all. Transmission and emission security attempts to avoid direction-finding techniques by sending a long message in one short burst or shifting radar frequencies.</dd>
<dd>Traffic security similarly tries to render traffic analysis fruitless by changing call-signs, sending dummy messages, and applying radio silence. This skill allows the application of existing methodologies. To develop new methodologies would require rolls against the appropriate skill: Chemistry to develop a new invisible ink, Engineering for hidden compartments, etc.</dd>
<dt>Signal Intelligence Collection/Jamming/TL (Mental/Average) No default</dt>
<dd>This is the ability to operate sophisticated intelligence-gathering and direction-finding systems targeted at secure signals. In modern times this can include voice or Morse radios, telephones, radar, telemetry, etc. In earlier times it would be limited to detecting invisible inks and the like. Again, &#8216;signal&#8217; can mean any type of information transfer.</dd>
<dd>Modifiers: −2 for isolated communications shorter than one minute, −1 to −10 for rough handling or poor maintenance of equipment. [This skill originally appeared in <em>GURPS Special Ops</em>.]</dd>
<dt>Traffic Analysis/TL (Mental/Hard) No default</dt>
<dd>This is the ability to identify target unit types and organizational structures from data such as callsigns, prosigns, and transmission patterns of intercepted communications traffic. [This skill originally appeared in <em>GURPS Special Ops</em>.]</dd>
</dl>
<h2>Investigation of Problems and Solutions (Cryptographic Techniques)</h2>
<p>The standard problem for cryptographers is to send messages from one party to another such that no other party can gain information from the message. Here are some other things that aspiring cryptographers can develop:</p>
<ul>
<li>Anonymous Election: electronic election where every voter&#8217;s vote remains private and every voter can check that the election was not falsely manipulated. −6 penalty.</li>
<li>Anonymous Transactions: electronic transaction where one party remains anonymous, but the other party receives some assurance (such as ability to pay or authorization). −4 penalty.</li>
<li>Certified Mail: simultaneous exchange of a secret message and a signed receipt. −4 penalty.</li>
<li>Digital Signature: the recipient can be sure of the sender&#8217;s identity, but the message is not secret. No penalty.</li>
<li>Contract Signing: digital signatures are simultaneously exchanged. −2 penalty, or −4 if the signed document is secret.</li>
<li>Oblivious Transfer: the sender cannot be certain if the intended recipient receives the secret message. −2 penalty.</li>
<li>Secret Sharing: a group of people all hold pieces of a secret, which are unintelligible taken individually. If a large enough percentage of the group put their pieces together, the secret can be produced. −4 penalty.</li>
</ul>
<p>Each of these additional properties would represent a −2 penalty: anonymity, authentication, multi-party usage, obliviousness, secrecy, and simultaneity.</p>
<h2>Rules for &#8216;Attacking&#8217; Cryptograms</h2>
<p>If the game includes both cryptographers and cryptanalysts making and breaking codes, the GM should treat attacks on cryptographic systems as contests of skill rather than simple skill rolls. Whenever a new protocol is developed, record the amount by which the roll was made. When it is later attacked, the cryptanalyst must succeed by that amount or more. Usually, however, the GM will be creating all of the protocols (or using historical ones) and the players will be trying to break them. In this case, the GM assigns modifiers to the different protocols as he sees fit, and the cryptanalysts must make rolls at the specified penalties (or bonuses).</p>
<p>An attack on a secrecy protocol has varying degrees of success. If the cryptanalyst succeeds by 1 or less, the message is only partially decoded. The GM gives the player some interesting pieces of information, but not all of it. If he succeeds by 2 or more, the entire message is decrypted. If he succeeds by 6 or more, he can also decrypt any future messages sent in the same protocol with the same key. On a critical success, he can obtain the secret key as well. Note that if the cryptanalyst knows the protocol being used, he can often determine the secret key once an entire message has been decrypted without a critical success.</p>
<p>An attack on an authentication protocol also has varying degrees of success. If the cryptanalyst succeeds by 1 or less, he has achieved an existential forgery—he can forge a signature on one message chosen at random. If he succeeds by 2 or more, he can forge the signature on one message of his choosing. If he succeeds by 6 or more, he can forge the signature on any number of messages. On a critical success, he can obtain the signer&#8217;s private key as well.</p>
<p>In a cinematic campaign, all keys and passwords are words, numbers, or phrases that have special meaning to the user and can be guessed. Examples include &#8216;TRUSTNO1&#8242; for Fox Mulder on <a href="http://amzn.to/Zzwd4t" target="_blank"><em>The X-Files</em></a> television series and &#8216;RAMESES II&#8217; for Ozymandias in the <em> <a href="http://amzn.to/ZeIWTS" target="_blank">Watchmen</a></em> graphic novel. &#8216;PASSWORD&#8217;, &#8216;SECRET&#8217;, and &#8216;SEX&#8217; are good guesses for unsophisticated users, along with birth dates and maiden names. In a cinematic campaign, or a realistic game with naive users, the GM can allow a character to guess such a password or key on a roll of 3 on 3 dice. Bonuses should be given for intimate knowledge of the subject&#8217;s biographical information, or for the importance to the game&#8217;s plot. Or if the character has time and resources for a brute force attack on a system that the GM (or player) has already determined is protected by one of the naive passwords, the GM can rule that success is automatic.</p>
<p>Note that the magical spell Encrypt (<a href="http://amzn.to/17osNSw" target="_blank"><em>GURPS Grimoire</em></a>, p. 78) will produce &#8216;encrypted&#8217; text that cannot be deciphered through mundane cryptanalytical attacks. It must be resisted or magically dispelled, or the encrypted item must be taken to a no-mana area. Truly fiendish mages will translate their most secret works into an ancient or alien language, encrypt it using mundane techniques, and then enchant the resulting work with the magical spell. See <a href="http://amzn.to/YIfUzL" target="_blank"><em>GURPS Magic Items 2</em></a>, pp. 40-41, for even more convoluted methods.</p>
<h2>Further Reading</h2>
<h3>Non-fiction</h3>
<ul>
<li><a href="http://amzn.to/10E0prV" target="_blank">HIDDEN CODES &amp; GRAND DESIGNS</a>. Pierre Berloquin. Sterling, 2010.</li>
<li><a href="http://amzn.to/11Nvf2B" target="_blank">MODERN CRYPTOLOGY: A TUTORIAL</a>. Gilles Brassard in Lecture Notes in Computer Science, Vol. 325. Springer-Verlag, 1988.</li>
<li><a href="http://amzn.to/17ore75" target="_blank">THE CODE-BREAKERS</a>. David Kahn. Scribner, 1996.</li>
</ul>
<h3>Fiction</h3>
<ul>
<li><a href="http://amzn.to/10JdApR" target="_blank">THE VOYNICH CYPHER</a>. Russell Blake. CreateSpace, 2012.</li>
<li><a href="http://amzn.to/ZzraRv" target="_blank">ENIGMA</a>. Robert Harris. Random House, 1995.</li>
<li><a href="http://amzn.to/16LU0eE" target="_blank">CRYPTONOMICON</a>. Neal Stephenson. Avon, 2002.</li>
</ul>
<p style="text-align: right;">—jhunterj</p>
]]></content:encoded>
			<wfw:commentRss>http://jhunterj.com/2013/04/10/gurps-cryptology/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The Old Bait and Hitch</title>
		<link>http://jhunterj.com/2012/10/29/the-old-bait-and-hitch/</link>
		<comments>http://jhunterj.com/2012/10/29/the-old-bait-and-hitch/#comments</comments>
		<pubDate>Mon, 29 Oct 2012 12:37:15 +0000</pubDate>
		<dc:creator><![CDATA[Hunter]]></dc:creator>
				<category><![CDATA[Gaming]]></category>
		<category><![CDATA[Writing]]></category>
		<category><![CDATA[gurps]]></category>
		<category><![CDATA[wwii]]></category>

		<guid isPermaLink="false">http://jhunterj.com/?p=71</guid>
		<description><![CDATA[Once upon a time, I found myself in the wonderful position of writing a supplement for the GURPS WWII line. GURPS WWII: Frozen Hell covers the Finnish involvement in three wars within World War II: the Winter War of 1939–40, <a class="more-link" href="http://jhunterj.com/2012/10/29/the-old-bait-and-hitch/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<div style="width: 204px" class="wp-caption alignright"><a href="http://amzn.to/TpTeAS"><img title="GURPS WWII: Frozen Hell" src="http://e23.sjgames.com/media/SJG30-8008.jpg" alt="GURPS WWII: Frozen Hell cover" width="194" height="300" /></a><p class="wp-caption-text">GURPS WWII: Frozen Hell</p></div>
<p>Once upon a time, I found myself in the wonderful position of writing a supplement for the <a href="http://amzn.to/RoLhv1"><em>GURPS WWII</em></a> line. <a href="http://amzn.to/TpTeAS"><em>GURPS WWII: Frozen Hell</em></a> covers the Finnish involvement in three wars within World War II: the Winter War of 1939–40, the Continuation War of 1941–44, and the Lapland War of 1944–45. There is precious little written in English on the actions and interactions of the Finns in WWII, and I took my title from the best of those few: <a href="http://amzn.to/Pg0COH"><em>A Frozen Hell</em></a>, by William R. Trotter. I also wanted to ask Mr. Trotter to write the foreword to the book. But at the time I could not sift the Internet into yielding his contact information.</p>
<p>So I put a plan into motion to have him contact me…</p>
<p>I had gotten interested in the topic when I picked up Trotter&#8217;s <a href="http://amzn.to/RoLkak"><em>Winter Fire</em></a> at my local library. (I might even have stumbled across it while prepping for <a href="http://amzn.to/Pg0NJT"><em>GURPS Monsters</em></a> a few years earlier.) The novel was great, and I found that Trotter had also written a non-fiction account of the Finnish war experience too: <em>A Frozen Hell</em>. It was just as engrossing as the novel. So when the WWII line of GURPS books was being formalized, I offered to write the Finnish book.</p>
<p>So far, so good. <a href="http://www.wclibrary.info/">Washington–Centerville Library</a> was great at getting the various books (and film!) I needed to bring the book to life, and as the writing was drawing to a close, it occurred to me to ask Mr. Trotter to write a brief bit of intro for the book. But, as mentioned, the Internet at that time would not give up his email address. So I tried to attract his attention to me.</p>
<p>I created <a href="http://www.amazon.com/lm/55FCYO98YYH7/?_encoding=UTF8&amp;camp=1789&amp;creative=9325&amp;linkCode=ur2&amp;tag=hunterjohnson" target="_blank">The Trotter Blotter</a><img style="border: none !important; margin: 0px !important;" src="http://www.assoc-amazon.com/e/ir?t=hunterjohnson&amp;l=ur2&amp;o=1" alt="" width="1" height="1" border="0" /> listing everything even slightly related to Mr. Trotter&#8217;s opus as an Amazon ListMania list. It was shorter then, and missing even some of the older books, but the inclusion of the 1974 <a href="http://amzn.to/TpTaky"><em>Word Processing</em></a> by Thomas Johnston Anderson and 1999&#8242;s <a href="http://amzn.to/Q1rSBZ"><em>66 Frames</em></a> by Gordon Ball were proof that I had put more effort in than simply reformatting an Amazon search. (Google Books and Amazon&#8217;s own &#8220;Search Inside&#8221; feature weren&#8217;t around back then, but the Library of Congress website and some news searches helped.)</p>
<p>That was it. I tinkered with it a little, but it only took a couple of weeks for the email to come in. William R. Trotter, or Bill in day-to-day life, reached out to say thanks and to provide some additional information on new entries and corrections to what I had. I made those changes, pitched the idea of a brief intro, and we were set.</p>
<p>This is an illustration of one of the classic &#8220;rules&#8221; of networking: offer value to the people you&#8217;re networking with (or that you&#8217;d like to network with). If you&#8217;re only bringing up what they can do for you, it&#8217;s likely to be a short discussion. And it&#8217;s fine to have your own interests in mind too—there&#8217;s a line between mutual backscratching and using people, and I guess it has more to do with how miserly you are with your gifts to them. Be helpful, be good at it, be happy to be good at it, and trust the people you&#8217;re networking with. You might still be misconstrued and occasionally burned, but it seems to be a recipe for long-run success.</p>
<p>I got to meet Bill later at an <a href="http://www.originsgamefair.com/">Origins</a> convention a few years later, I got a couple of books signed, and we chatted over dinner. I told him this story of how I set up the Amazon page to lure him in, which he appreciated even in hindsight (&#8220;… and I fell for it!&#8221;). He also liked the title enough to ask to use it on his website <a href="http://www.trotterbooks.com/">Trotterbooks.com</a>, so you can find a different &#8220;Trotter Blotter&#8221; there now.</p>
<p>You can also check out <a href="http://www.sjgames.com/pyramid/sample.html?id=3359">my <em>GURPS WWII: A Frozen Hell</em> Designer&#8217;s Notes</a> from <em>Pyramid</em> magazine; it&#8217;s one of their free sample articles. The book itself is also available in PDF from e23: <a href="http://e23.sjgames.com/item.html?id=SJG30-8008"><em>GURPS WWII: Frozen Hell</em></a>. And if you like any kind of weird fiction, do yourself a favor and check out <em><a href="http://amzn.to/WUY0cf">Warrener&#8217;s Beastie</a></em> by Bill; not Finnish, but still fabulous.</p>
<p style="text-align: right;"> —jhunterj</p>
]]></content:encoded>
			<wfw:commentRss>http://jhunterj.com/2012/10/29/the-old-bait-and-hitch/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
