Canon

Encryption code: Difference between revisions

From Halopedia, the Halo wiki

m (→‎Covenant usage: Link replacement, replaced: ''CCS''-class battlecruiser → {{Pattern|Ket|battlecruiser}})
 
(48 intermediate revisions by 17 users not shown)
Line 1: Line 1:
{{Era|FOR|H1|GOO}}
{{Status|Canon}}
{{ratings}}
{{Wikipedia|Encryption}}
An '''Encryption Code''', otherwise known as an '''Encryption Key''' or an '''Encryption Scheme''', is a functional parameter of cryptological encoding used for security purposes.
An '''encryption code''', otherwise known as an '''encryption key''' or an '''encryption scheme''', is a functional parameter of cryptological encoding used for security purposes.


==Cryptological Theory==
==Cryptological theory==
Encryption only enables senders with the appropriate decryption devices to read secretive transmissions or documents. Persons or organizations that do not possess the appropriate decryption key to decrypt an encrypted file must result to a battery of cryptological techniques to decrypt files, even using artificial cognitive computation sources as powerful as smart [[AI]]s.  
Encryption only enables senders with the appropriate decryption devices to read secretive transmissions or documents. Persons or organizations that do not possess the appropriate decryption key to decrypt an encrypted file must result to a battery of cryptological techniques to decrypt files, even using artificial cognitive computation sources as powerful as [[Smart AI|"smart"]] [[Artificial intelligence|AIs]].


The sender will encrypt a piece and send it to the receiver, and will list both the ''public key'' and ''private key'' of the file. The public key is widely available, and was used to encrypt the file. The private key is available only to the receiver, and is used to decrypt the file.<ref>[[wikipedia:Public-key cryptography|"Public-key cryptography" on Wikipedia, the free encyclopedia]]</ref>
The sender will encrypt a piece and send it to the receiver, and will list both the ''public key'' and ''private key'' of the file. The public key is widely available, and was used to encrypt the file. The private key is available only to the receiver, and is used to decrypt the file.<ref>[[wikipedia:Public-key cryptography|"Public-key cryptography" on Wikipedia, the free encyclopedia]]</ref>
Line 10: Line 10:
The [[Covenant]] and the [[United Nations Space Command]] both use encryption devices to hide military tactics and orders.
The [[Covenant]] and the [[United Nations Space Command]] both use encryption devices to hide military tactics and orders.


==Covenant Usage==
==Covenant usage==
The Covenant occasionally place advanced encryption on high-importance locked doors within their warships, such as the [[CCS-class Battlecruiser|''CCS''-class Battlecruiser]] ''[[Truth and Reconciliation]]''. During the UNSC raid on the battlecruiser, the Covenant locked the UNSC assault squad in the hangar bays with 128,000-bit modulating encryption<ref>''[[The Truth and Reconciliation (Level)|The Truth and Reconciliation]]''</ref> until [[Cortana]] was able to hack the doors to open and let the UNSC forces venture further into the ship.
The Covenant occasionally place advanced encryption on high-importance locked doors within their warships, such as the {{Pattern|Ket|battlecruiser}} ''[[Truth and Reconciliation]]''. During the [[Battle for the Truth and Reconciliation|UNSC raid on the battlecruiser]], the Covenant locked the UNSC assault squad in the hangar bays with 128,000-bit modulating encryption<ref>''[[The Truth and Reconciliation]]''</ref> until [[Cortana]] was able to hack the doors to open and let the UNSC forces venture further into the ship.


==UNSC Usage==
==UNSC usage==
Encryption is placed on [[UNSC]] documentation or transmissions in order to maintain the level of secrecy demanded by the [[Transmission Classification]]. Encryption codes, like classifications, come in varying types, based on the importance of the information in the file.  
Encryption is placed on [[United Nations Space Command|UNSC]] documentation or transmissions in order to maintain the level of secrecy demanded by the [[Transmission Classification]]. Encryption codes, like classifications, come in varying types, based on the importance of the information in the file.


===Encryption Keys===
===Encryption keys===
*'''None''' - Transmissions without code are not classified at all and can be accessed by anyone at any time. Examples of this include the journals produced by [[UNSC Astrophysics]].
*'''None''' - Transmissions without code are not classified at all and can be accessed by anyone at any time. Examples of this include the journals produced by [[UNSC Astrophysics]], such as [[UNSC Astrophysics Journal 034-23-01]].<ref name="none">'''[[Halo: The Fall of Reach]]''', Chapter 16, ''page 141'' (2001 paperback); ''page 165'' (2010 paperback)</ref>


*'''Red''' - This code is used most of the time in military transmissions. Classification can be "Restricted," "Classified," or "Secret". The code is sometimes harder to crack, depending on how complex the scheme of the code can be. Examples of this code include the [[Cole Protocol]]. It was used before or during [[2552]] to encrypt [[UNSC Emergency Priority Order 098831A-1]].
*'''Red''' - This code is used most of the time in military transmissions. Classification can be "Restricted," "Classified," or "Secret". The code is sometimes harder to crack, depending on how complex the scheme of the code can be. Examples of this code include the [[United Nations Space Command Emergency Priority Order 098831A-1|Cole Protocol]]. It was used before or during [[2552]] to encrypt [[UNSC Emergency Priority Order 098831A-1]].<ref name="lightning">'''Halo: The Fall of Reach''', Chapter 23, ''page 214'' (2001 paperback); ''page 245'' (2010 paperback)</ref>


*'''Black''' - This higher level code is used for more important and urgent information, which can be classified<ref>[[Halo: Ghosts of Onyx]], page 122</ref>.
*'''Black''' - This higher level code is used for more important and urgent information, which can be classified.<ref name="seasonal">'''[[Halo: Ghosts of Onyx]]''', Chapter 13, ''page 122''</ref>


*'''Gamma''' - This is one of the highest level codes. It is used on the most classified information and is likely to be an extremely complex code. It coincided with the classification of "Eyes Only Top Secret."
*'''Gamma''' - This is one of the highest level codes. It is used on the most classified information and is likely to be an extremely complex code. It coincided with the classification of "Eyes Only Top Secret."<ref>'''Halo: The Fall of Reach''', Chapter 30, ''page 281'' (2001 paperback); ''page 317'' (2010 paperback)</ref>


===Public Keys===
*'''Gamma-Shift-X-Ray''' - This is a code used to encrypt files. It was used to encrypt [[Historical/Psychological Analysis of Cole, Preston J.]].<ref>'''[[Halo: Evolutions - Essential Tales of the Halo Universe]]''', "[[The Impossible Life and the Possible Death of Preston J. Cole]]", ''page 413'' (2009 paperpack); ''page 251'' (2010 Volume 1 paperback)</ref>
*[[file/bravo-tango-beta-five/]]
*[[file/first light/]]


==References==
*'''Umber''' - This is a code used to encrypt files. It was used to encrypt [[UNSC Priority Transmission 00143A-23|files]] related to 92738-61842-LC's investigations regarding the Guardian incident in 2558.<ref>'''[[Halo Legendary Crate]]''' ''- [[Halo Legendary Crate/Data Drops|Data Drop 7]]''</ref>
<references/>


[[Category:Technology]]
===Public keys===
[[Category:UNSC]]
====Red====
*[[file/albatross-seven-lucifer-zeno/]]<ref>'''Halo: Evolutions - Essential Tales of the Halo Universe''', "The Impossible Life and the Possible Death of Preston J. Cole", ''page 454'' (2009 paperpack); ''page 301'' (2010 Volume 1 paperback)</ref>
*[[file/bravo-tango-beta-five/]]<ref name="bravo">'''Halo: The Fall of Reach''', Chapter 32, ''page 289'' (2001 paperback); ''page 326'' (2010 paperback)</ref>
*[[file/douglas-six-six-lima/]]<ref name="douglas">'''Halo: The Fall of Reach''', 2010 Bonus Content, ''page 395''</ref>
*[[file/excised access Omega/]]<ref name="Omega">'''Halo: The Fall of Reach''', Chapter 6, ''page 56'' (2001 paperback); ''page 74'' (2010 paperback)</ref>
*[[file/first light/]]<ref name="first">'''Halo: The Fall of Reach''', Chapter 15, ''page 135'' (2001 paperback); ''page 159'' (2010 paperback)</ref>
*[[file/lightning-matrix-four/]]{{Ref/Reuse|lightning}}
*[[file/vegas-anaconda-mockingbird-zero/]]<ref>'''Halo: Evolutions - Essential Tales of the Halo Universe''', "The Impossible Life and the Possible Death of Preston J. Cole", ''page 467'' (2009 paperpack); ''page 326'' (2010 Volume 1 paperback)</ref>
 
====Black====
*[[file/delta-charlie-niner/Iona]]<ref>'''[[Halo: Blood Line]]''', ''[[Halo: Blood Line Issue 2|Issue 2]]''</ref>
*[[file/gamma-thunder-twelve]]<ref>'''Halo: Blood Line''', ''[[Halo: Blood Line Issue 1|Issue 1]]''</ref>
*[[file/rho-hotel-eight/Iona]]<ref>'''Halo: Blood Line''', ''[[Halo: Blood Line Issue 3|Issue 3]]''</ref>
*[[file/seasonal/]]{{Ref/Reuse|seasonal}}
*[[file/zulu-oscar-papa/Iona]]<ref>'''Halo: Blood Line''', ''[[Halo: Blood Line Issue 4|Issue 4]]''</ref>
 
====Gamma====
*[[user/bmorad]]<ref>[https://www.halowaypoint.com/en-us/news/canon-fodder-second-to-none '''Halo Waypoint''': ''Canon Fodder 2/26/2015: Issue 13 Second to None'']</ref>
 
====Unknown====
*[[file/red rover red rover/]]<ref name="rover">'''Halo: The Fall of Reach''', Chapter 34, ''page 302'' (2001 paperback); ''page 339'' (2010 paperback)</ref>
 
===Transmissions===
Below is a list of transmissions sent that were encrypted by encryption codes:
====None====
*[[UNSC Astrophysics Journal 034-23-01]] (DIMENSIONAL-MASS SPACE COMPRESSIONS IN SHAW-FUJIKAWA (A.K.A "SLIPSTREAM") SPACE)
 
====Red====
*[[UNSC Alpha Priority Transmission 04592Z-83|UNITED NATIONS SPACE COMMAND ALPHA PRIORITY TRANSMISSION 04592Z-83]] (IMMEDIATE RECALL)
 
*[[UNSC Transmission 08871D-00|UNITED NATIONS SPACE COMMAND TRANSMISSION 08871D-00]] (TROUBLE)
 
*[[UNSC Priority Transmission 09872H-98|UNITED NATIONS SPACE COMMAND PRIORITY TRANSMISSION 09872H-98]] (MITIGATING FACTORS AND RELATIVE BIOLOGICAL RISKS ASSOCIATED WITH QUERIED EXPERIMENTAL MEDIAL PROCEDURES)
 
*[[ORDERS FOR YOUR IMMEDIATE CONSIDERATION|UNITED NATIONS SPACE COMMAND PRIORITY TRANSMISSION 09872H-98]] (ORDERS FOR YOUR IMMEDIATE CONSIDERATION)
 
*[[UNSC Emergency Priority Order 098831A-1 (transmission)|UNITED NATIONS SPACE COMMAND EMERGENCY PRIORITY ORDER 098831A-1]] (GENERAL ORDER 098831A-1 (“THE COLE PROTOCOL”))
 
*[[UNSC Transmission 102482-02|UNITED NATIONS SPACE COMMAND TRANSMISSION 102482-02]] (SAFEGUARDING NAVIGATION DATA – MORE THOUGHTS)
 
*[[UNSC Transmission 116749-09|UNITED NATIONS SPACE COMMAND TRANSMISSION 116749-09]] (REQUISITIONS, TRANSFERS, AND FAVORS)
 
*[[UNSC Transmission 34670J-17|UNITED NATIONS SPACE COMMAND TRANSMISSION 34670J-17]] (READINESS)
 
====Black====
*[[UNSC Priority Transmission 90872H-11|UNITED NATIONS SPACE COMMAND PRIORITY TRANSMISSION 90872H-11]] (OPERATION BLOWBACK)
*[[United Nations Space Command Priority Transmission FLASH 91762P-06|UNITED NATIONS SPACE COMMAND PRIORITY TRANSMISSION FLASH 91762P-06]] (EMERGENCY ALERT STATUS)
 
====Gamma====
*[[Historical/Psychological Analysis of Cole, Preston J.|PLNB TRANSMISSION XX087R-XX]] (Historical/Psychological Analysis of Cole, Preston J.)
*[[PROGRESS REPORT/OPERATION HYPODERMIC|PLNB TRANSMISSION XX087R-XX]] (PROGRESS REPORT/OPERATION HYPODERMIC)
*[[PLNB Transmission XX219C-XX|PLNB TRANSMISSION XX219C-XX]] (INVESTIGATION UPDATE/OPERATION: BLEACH)
 
====Umber====
*[[UNSC Priority Transmission 00143A-23/THE CRYORAETH DIALOGUE|UNSC PRIORITY TRANSMISSION 00143A-23]] (THE CRYORAETH DIALOGUE)
*[[UNSC Priority Transmission 00143A-23/SUBJECT DENVER|UNSC PRIORITY TRANSMISSION 00143A-23]] (SUBJECT DENVER)
*[[UNSC Priority Transmission 00143A-23/S-117 DEBREIF|UNSC PRIORITY TRANSMISSION 00143A-23]] (S-117 DEBREIF)
*[[UNSC Priority Transmission 00143A-23/CLAYTON TRANSMISSION B12|UNSC PRIORITY TRANSMISSION 00143A-23]] (CLAYTON TRANSMISSION B12)
 
====Unknown====
*[[Public Key: Red Rover Red Rover]]
 
==Apocrypha==
To help advertise the then upcoming "Gears 5", [[Jeff Easterling]] wrote a transmission called [[UNSC Priority Transmission 00106C-54|UNSC PRIORITY TRANSMISSION 00106C-54]], in this transmission had the "PINION" encryption code. This transmission is not considered "Core Canon".<ref name="CF105">[https://www.halowaypoint.com/en-us/news/gears-of-lore ''Halo Waypoint'': Canon Fodder 8/21/2019: Issue 105 Gears of Lore]</ref>
 
==List of appearances==
*''[[Halo: The Fall of Reach]]'' {{1st}}
**''[[Halo: The Fall of Reach#2010 bonus content|Adjunct]]''
*''[[Halo: Combat Evolved]]''
**''[[Halo: Combat Evolved Anniversary]]''
*''[[Halo: Ghosts of Onyx]]''
*''[[Halo: Blood Line]]''
*''[[Halo: Evolutions - Essential Tales of the Halo Universe]]''
**''[[The Impossible Life and the Possible Death of Preston J. Cole]]''
 
==Sources==
{{Ref/Sources}}
 
[[Category:Security technology]]

Latest revision as of 17:34, September 6, 2022

Wikipedia.png
There is more information available on this subject at Encryption code on the English Wikipedia.

An encryption code, otherwise known as an encryption key or an encryption scheme, is a functional parameter of cryptological encoding used for security purposes.

Cryptological theory[edit]

Encryption only enables senders with the appropriate decryption devices to read secretive transmissions or documents. Persons or organizations that do not possess the appropriate decryption key to decrypt an encrypted file must result to a battery of cryptological techniques to decrypt files, even using artificial cognitive computation sources as powerful as "smart" AIs.

The sender will encrypt a piece and send it to the receiver, and will list both the public key and private key of the file. The public key is widely available, and was used to encrypt the file. The private key is available only to the receiver, and is used to decrypt the file.[1]

The Covenant and the United Nations Space Command both use encryption devices to hide military tactics and orders.

Covenant usage[edit]

The Covenant occasionally place advanced encryption on high-importance locked doors within their warships, such as the Ket-pattern battlecruiser Truth and Reconciliation. During the UNSC raid on the battlecruiser, the Covenant locked the UNSC assault squad in the hangar bays with 128,000-bit modulating encryption[2] until Cortana was able to hack the doors to open and let the UNSC forces venture further into the ship.

UNSC usage[edit]

Encryption is placed on UNSC documentation or transmissions in order to maintain the level of secrecy demanded by the Transmission Classification. Encryption codes, like classifications, come in varying types, based on the importance of the information in the file.

Encryption keys[edit]

  • Red - This code is used most of the time in military transmissions. Classification can be "Restricted," "Classified," or "Secret". The code is sometimes harder to crack, depending on how complex the scheme of the code can be. Examples of this code include the Cole Protocol. It was used before or during 2552 to encrypt UNSC Emergency Priority Order 098831A-1.[4]
  • Black - This higher level code is used for more important and urgent information, which can be classified.[5]
  • Gamma - This is one of the highest level codes. It is used on the most classified information and is likely to be an extremely complex code. It coincided with the classification of "Eyes Only Top Secret."[6]
  • Umber - This is a code used to encrypt files. It was used to encrypt files related to 92738-61842-LC's investigations regarding the Guardian incident in 2558.[8]

Public keys[edit]

Red[edit]

Black[edit]

Gamma[edit]

Unknown[edit]

Transmissions[edit]

Below is a list of transmissions sent that were encrypted by encryption codes:

None[edit]

Red[edit]

Black[edit]

Gamma[edit]

Umber[edit]

Unknown[edit]

Apocrypha[edit]

To help advertise the then upcoming "Gears 5", Jeff Easterling wrote a transmission called UNSC PRIORITY TRANSMISSION 00106C-54, in this transmission had the "PINION" encryption code. This transmission is not considered "Core Canon".[21]

List of appearances[edit]

Sources[edit]

  1. ^ "Public-key cryptography" on Wikipedia, the free encyclopedia
  2. ^ The Truth and Reconciliation
  3. ^ Halo: The Fall of Reach, Chapter 16, page 141 (2001 paperback); page 165 (2010 paperback)
  4. ^ a b Halo: The Fall of Reach, Chapter 23, page 214 (2001 paperback); page 245 (2010 paperback)
  5. ^ a b Halo: Ghosts of Onyx, Chapter 13, page 122
  6. ^ Halo: The Fall of Reach, Chapter 30, page 281 (2001 paperback); page 317 (2010 paperback)
  7. ^ Halo: Evolutions - Essential Tales of the Halo Universe, "The Impossible Life and the Possible Death of Preston J. Cole", page 413 (2009 paperpack); page 251 (2010 Volume 1 paperback)
  8. ^ Halo Legendary Crate - Data Drop 7
  9. ^ Halo: Evolutions - Essential Tales of the Halo Universe, "The Impossible Life and the Possible Death of Preston J. Cole", page 454 (2009 paperpack); page 301 (2010 Volume 1 paperback)
  10. ^ Halo: The Fall of Reach, Chapter 32, page 289 (2001 paperback); page 326 (2010 paperback)
  11. ^ Halo: The Fall of Reach, 2010 Bonus Content, page 395
  12. ^ Halo: The Fall of Reach, Chapter 6, page 56 (2001 paperback); page 74 (2010 paperback)
  13. ^ Halo: The Fall of Reach, Chapter 15, page 135 (2001 paperback); page 159 (2010 paperback)
  14. ^ Halo: Evolutions - Essential Tales of the Halo Universe, "The Impossible Life and the Possible Death of Preston J. Cole", page 467 (2009 paperpack); page 326 (2010 Volume 1 paperback)
  15. ^ Halo: Blood Line, Issue 2
  16. ^ Halo: Blood Line, Issue 1
  17. ^ Halo: Blood Line, Issue 3
  18. ^ Halo: Blood Line, Issue 4
  19. ^ Halo Waypoint: Canon Fodder 2/26/2015: Issue 13 Second to None
  20. ^ Halo: The Fall of Reach, Chapter 34, page 302 (2001 paperback); page 339 (2010 paperback)
  21. ^ Halo Waypoint: Canon Fodder 8/21/2019: Issue 105 Gears of Lore