Follow TV Tropes

Following

History Main / HollywoodEncryption

Go To

OR

Is there an issue? Send a MessageReason:
None

Added DiffLines:

* ''Literature/ArtemisFowl'': {{Zigzagged|Trope}} in the third book ''The Eternity Code'', where Artemis uses fairy technology to construct a combination MagicalComputer[=/=]EverythingSensor decades ahead of anything on Earth, only to have it stolen by the BigBad. Despite the Cube being secured by an "Eternity Code" which would supposedly take an infinite amount of time to crack, Artemis worries that the villain's resources would allow him do it in "quite a bit less"... and that even ''without'' unlocking the Cube he could still make massive gains from reverse-engineering its hardware. Eventually the BigBad decides to just kidnap Artemis and force him to unlock it.
Is there an issue? Send a MessageReason:
None


[[folder]]

to:

[[folder]][[folder: Tabletop Games]]
Is there an issue? Send a MessageReason:
None

Added DiffLines:

[[folder]]
* In ''TabletopGame/TranshumanSpace'' decent crypto is basically uncrackable. This doesn't mean people can't break into your computer, but if they do, it's because you've done something stupid.
[[/folder]]
Is there an issue? Send a MessageReason:
None


* In ''[[FanFic/SovereignGFCOrigins Origins]]'', a ''MassEffect''[=/=]''StarWars''[[spoiler:[=/=]''[=Borderlands=]''[=/=]''[=Halo=]'']] MassiveMultiplayerCrossover, there's a subversion. As opposed to most [[InsecuritySystem Insecurity Systems]] (lampshaded by Samantha Shepard), the super-dreadnaught ''Farsight'' has encryption that relies on data being accessed from within its network because only there can a file be decrypted with multi-part hardware keys that are built into the starship's computers. Even [[spoiler:''Cortana'']] can't break it despite cracking everything previously with ease, so the heroes end up accessing the system by getting someone who has authorization to unlock the data they need.

to:

* In ''[[FanFic/SovereignGFCOrigins Origins]]'', a ''MassEffect''[=/=]''StarWars''[[spoiler:[=/=]''[=Borderlands=]''[=/=]''[=Halo=]'']] ''Franchise/MassEffect''[=/=]''Franchise/StarWars''[[spoiler:[=/=]''[=Borderlands=]''[=/=]''[=Halo=]'']] MassiveMultiplayerCrossover, there's a subversion. As opposed to most [[InsecuritySystem Insecurity Systems]] (lampshaded by Samantha Shepard), the super-dreadnaught ''Farsight'' has encryption that relies on data being accessed from within its network because only there can a file be decrypted with multi-part hardware keys that are built into the starship's computers. Even [[spoiler:''Cortana'']] can't break it despite cracking everything previously with ease, so the heroes end up accessing the system by getting someone who has authorization to unlock the data they need.
Is there an issue? Send a MessageReason:
None


Modern cryptography is a very, very, very serious business. At its most prosaic encryption is what makes all forms of online commerce possible, without which the economies of the technologically modern world would grind to a halt. More dramatically it can protect citizens from TheMan or keep military secrets safe from spies. Broken encryption might mean losing millions of dollars when the competition steals your company's new invention or just an awkward conversation about your PornStash from your parents. It's the only barrier that separates would-be thieves from emptying your bank account. And, of course, it is also the basis of communication for [[AncientConspiracy Ancient Conspiracies]], shadowy criminal organizations, perfectly legitimate corporations and [[LaResistance freedom fighters]].

to:

Modern cryptography is a very, very, very serious business. At its most prosaic prosaic, encryption is what makes all forms of online commerce possible, without which the economies of the technologically modern world would grind to a halt. More dramatically it can protect citizens from TheMan or keep military secrets safe from spies. Broken encryption might mean losing millions of dollars when the competition steals your company's new invention or just an awkward conversation about your PornStash from your parents. It's the only barrier that separates would-be thieves from emptying your bank account. And, of course, it is also the basis of communication for [[AncientConspiracy Ancient Conspiracies]], shadowy criminal organizations, perfectly legitimate corporations and [[LaResistance freedom fighters]].
Is there an issue? Send a MessageReason:
typo


Modern cryptography is a very, very, very serious business. At its most prosaic encryption is what makes all forms of online commerce possible, without which the economies of the technologically modern world would grind to a halt. More dramatically it can protect citizens from TheMan or keep military secrets safe from spies. Broken encryption might mean losing millions of dollars when the competition steals your company's new invention or just an awkward conversation about your PornStash from your parents. It's the only barrier that separates would be thieves from emptying your bank account. And, of course, it is also the basis of communication for [[AncientConspiracy Ancient Conspiracies]], shadowy criminal organizations, perfectly legitimate corporations and [[LaResistance freedom fighters]].

to:

Modern cryptography is a very, very, very serious business. At its most prosaic encryption is what makes all forms of online commerce possible, without which the economies of the technologically modern world would grind to a halt. More dramatically it can protect citizens from TheMan or keep military secrets safe from spies. Broken encryption might mean losing millions of dollars when the competition steals your company's new invention or just an awkward conversation about your PornStash from your parents. It's the only barrier that separates would be would-be thieves from emptying your bank account. And, of course, it is also the basis of communication for [[AncientConspiracy Ancient Conspiracies]], shadowy criminal organizations, perfectly legitimate corporations and [[LaResistance freedom fighters]].
Is there an issue? Send a MessageReason:
"at least" probably isn't the comparison we're looking for


* Averted on ''Film/{{Blackhat}}'': The good guys manage to intercept an electronic message sent by the bad guys, but Hathaway (the PlayfulHacker BoxedCrook hero) points out once one of the agents asks him to decrypt the message that the message utilizes a 512-bit [[https://en.wikipedia.org/wiki/GNU_Privacy_Guard GPG]] code-theoretically, he ''would'' be able to crack it given enough time, but the "enough time" he's talking about is of a few ''months'' and they have ''at least'' hours remaining before the bad guys strike. They nearly give up on the lead as a result.

to:

* Averted on ''Film/{{Blackhat}}'': The good guys manage to intercept an electronic message sent by the bad guys, but Hathaway (the PlayfulHacker BoxedCrook hero) points out once one of the agents asks him to decrypt the message that the message utilizes a 512-bit [[https://en.wikipedia.org/wiki/GNU_Privacy_Guard GPG]] code-theoretically, he ''would'' be able to crack it given enough time, but the "enough time" he's talking about is of a few ''months'' and they have ''at least'' best'' hours remaining before the bad guys strike. They nearly give up on the lead as a result.
Is there an issue? Send a MessageReason:
None


Modern cryptography is a very, very, very serious business. At its most prosaic encryption is what makes all forms of online commerce possible, without which the economies of the technologically modern world would grind to a halt. More dramatically it can protect citizens from TheMan or keep military secrets safe from spies. Broken encryption might mean losing million of dollars when the competition steals your company's new invention or just an awkward conversation about your PornStash from your parents. It's the only barrier that separates would be thieves from emptying your bank account. And, of course, it is also the basis of communication for [[AncientConspiracy Ancient Conspiracies]], shadowy criminal organizations, perfectly legitimate corporations and [[LaResistance freedom fighters]].

Unfortunately for [[WritersCannotDoMath those who studied literature hoping to never, ever see a single number ever again]], crypto is also one of the difficult fields in the world, drawing from fields as diverse as number theory, abstract algebra, mathematical logic, information theory, and computer science. And ciphers are just the tip of the iceberg -- there are also associated algorithms such as cryptographic hashes, pseudorandom number generators, public key algorithms, and cryptosystems like SSL, PGP, [=NaCl=], SSH, [=IPsec=] or dm-crypt that tie them all together into something useful. Needless to say, this means any research in the subject done for pretty much any purpose needs to be ''very'' accurate, or else the fictional cryptosystem will be a total and utter piece of garbage and the cryptanalysis process will be basically black magic.

to:

Modern cryptography is a very, very, very serious business. At its most prosaic encryption is what makes all forms of online commerce possible, without which the economies of the technologically modern world would grind to a halt. More dramatically it can protect citizens from TheMan or keep military secrets safe from spies. Broken encryption might mean losing million millions of dollars when the competition steals your company's new invention or just an awkward conversation about your PornStash from your parents. It's the only barrier that separates would be thieves from emptying your bank account. And, of course, it is also the basis of communication for [[AncientConspiracy Ancient Conspiracies]], shadowy criminal organizations, perfectly legitimate corporations and [[LaResistance freedom fighters]].

Unfortunately for [[WritersCannotDoMath those who studied literature hoping to never, ever see a single number ever again]], crypto is also one of the most difficult fields in the world, drawing from fields concepts as diverse as number theory, abstract algebra, mathematical logic, information theory, and computer science. And ciphers are just the tip of the iceberg -- there are also associated algorithms such as cryptographic hashes, pseudorandom number generators, public key algorithms, and cryptosystems like SSL, PGP, [=NaCl=], SSH, [=IPsec=] or dm-crypt that tie them all together into something useful. Needless to say, this means any research in the subject done for pretty much any purpose needs to be ''very'' accurate, or else the fictional cryptosystem will be a total and utter piece of garbage and the cryptanalysis process will be basically black magic.
Is there an issue? Send a MessageReason:
None


Modern cryptography is a very, very, very serious business. At its most prosaic encryption is what makes all forms of online commerce possible, without which the economies of the technologically modern world would grind to a halt. More dramatically it can protect citizens from TheMan or keep military secrets safe from spies. Broken encryption might mean the losing million of dollars when the competition steals your company's new invention or just an awkward conversation about your PornStash from your parents. It's the only barrier that separates would be thieves from emptying your bank account. And, of course, it is also the basis of communication for [[AncientConspiracy Ancient Conspiracies]], shadowy criminal organizations, perfectly legitimate corporations and [[LaResistance freedom fighters]].

to:

Modern cryptography is a very, very, very serious business. At its most prosaic encryption is what makes all forms of online commerce possible, without which the economies of the technologically modern world would grind to a halt. More dramatically it can protect citizens from TheMan or keep military secrets safe from spies. Broken encryption might mean the losing million of dollars when the competition steals your company's new invention or just an awkward conversation about your PornStash from your parents. It's the only barrier that separates would be thieves from emptying your bank account. And, of course, it is also the basis of communication for [[AncientConspiracy Ancient Conspiracies]], shadowy criminal organizations, perfectly legitimate corporations and [[LaResistance freedom fighters]].
Is there an issue? Send a MessageReason:
None


* In ''Movie/TheAvengers'', the World Security Council comm panels each have a rotating cipher key in the lower right corner, constantly updating and matching to keep the connection secure.

to:

* In ''Movie/TheAvengers'', ''[[Film/TheAvengers2012 The Avengers]]'', the World Security Council comm panels each have a rotating cipher key in the lower right corner, constantly updating and matching to keep the connection secure.

Changed: 59

Removed: 11

Is there an issue? Send a MessageReason:
Fix


* The "Midnight Ride" episode of ''Series/SleepyHollow'' featured a [[https://en.wikipedia.org/wiki/Vigen%C3%A8re_cipher Vigenère cipher]] in an old document by John Adams, containing instructions on how to defeat the HeadlessHorseman. The document had been preserved and was available online, but nobody had been able to decipher it, before the protagonists found the keyword. The Vigenère cipher is a real cipher, and it was believed to be unbreakable for a long time, but nowadays it can be broken in hours by a human or seconds by a computer.

to:

* ''Series/SleepyHollow'': The "Midnight Ride" episode of ''Series/SleepyHollow'' featured a [[https://en.wikipedia.org/wiki/Vigen%C3%A8re_cipher Vigenère cipher]] in an old document by John Adams, containing instructions on how to defeat the HeadlessHorseman. The document had been preserved and was available online, but nobody had been able to decipher it, before the protagonists found the keyword. The Vigenère cipher is a real cipher, and it was believed to be unbreakable for a long time, but nowadays it can be broken in hours by a human or seconds by a computer.





to:

\n[[/folder]]



[[/folder]]

Added: 549

Changed: 530

Is there an issue? Send a MessageReason:
Folderizing.


[[AC:{{Anime}} and {{Manga}}]]

to:

[[AC:{{Anime}} [[foldercontrol]]

[[folder: Anime
and {{Manga}}]]Manga ]]



[[AC:Fan Works]]

to:

[[AC:Fan Works]][[/folder]]

[[folder: Fan Works ]]



[[AC:{{Film}}]]

to:

[[AC:{{Film}}]][[/folder]]

[[folder: Film ]]



[[AC:{{Literature}}]]
* In ''Literature/ABrothersPrice'', Jerin finds a book written in some simplistic fake thieves' cant. [[spoiler: Justified, as the man who needed to be able to read it was TooDumbToLive (yes, really, literally), and it had to be that simple.]] Of course, Jerin and his sisters, expert codebreakers, figure it out quickly.

to:

[[AC:{{Literature}}]]
[[/folder]]

[[folder: Literature ]]

* In ''Literature/ABrothersPrice'', Jerin finds a book written in some simplistic fake thieves' cant. [[spoiler: Justified, as the man who needed to be able to read it was TooDumbToLive (yes, really, literally), and it had to be that simple.]] Of course, Jerin and his sisters, expert codebreakers, figure it out quickly.



[[AC:LiveActionTV]]

to:

[[AC:LiveActionTV]][[/folder]]

[[folder: Live Action TV ]]



* The "Midnight Ride" episode of ''Series/SleepyHollow'' featured a [[https://en.wikipedia.org/wiki/Vigen%C3%A8re_cipher Vigenère cipher]] in an old document by John Adams, containing instructions on how to defeat the HeadlessHorseman. The document had been preserved and was available online, but nobody had been able to decipher it, before the protagonists found the keyword. The Vigenère cipher is a real cipher, and it was believed to be unbreakable for a long time, but nowadays it can be broken in hours by a human or seconds by a computer.

[[AC:Roleplay]]

to:

* The "Midnight Ride" episode of ''Series/SleepyHollow'' featured a [[https://en.wikipedia.org/wiki/Vigen%C3%A8re_cipher Vigenère cipher]] in an old document by John Adams, containing instructions on how to defeat the HeadlessHorseman. The document had been preserved and was available online, but nobody had been able to decipher it, before the protagonists found the keyword. The Vigenère cipher is a real cipher, and it was believed to be unbreakable for a long time, but nowadays it can be broken in hours by a human or seconds by a computer.

[[AC:Roleplay]][[/folder]]

[[folder: Roleplay ]]



[[AC:{{Anime}} & {{Manga}}]]

to:

[[AC:{{Anime}} [[/folder]]

[[folder: Anime
& {{Manga}}]]Manga ]]



[[AC:{{Film}}]]

to:

[[AC:{{Film}}]][[/folder]]

[[folder: Film ]]



[[AC:{{Literature}}]]

to:

[[AC:{{Literature}}]][[/folder]]

[[folder: Literature ]]



[[AC:VideoGames]]

to:

[[AC:VideoGames]][[/folder]]

[[folder: Video Games ]]





to:

\n[[/folder]]
Is there an issue? Send a MessageReason:
None
Is there an issue? Send a MessageReason:
The attack in Sneakers isn't quite fiction anymore.


* Averted thoroughly in ''{{Film/Sneakers}}''. While the MacGuffin is entirely fictional, if something did what it could do, it would be able to slice through virtually any modern encryption. The description of how cryptology works is dead-on accurate -- Len Adelman, cocreator of RSA (public-key) encryption, consulted on the movie. The [[ViewerFriendlyInterface visual representation]], on the other hand, is baloney.

to:

* Averted thoroughly in ''{{Film/Sneakers}}''. While the MacGuffin is entirely fictional, fictional (at the time, but nowadays quantum computing poses ''exactly'' the described threat[[http://en.wikipedia.org/wiki/Shor%27s_algorithm]]), if something did what it could do, it would be able to slice through virtually any modern encryption. The description of how cryptology works is dead-on accurate -- Len Adelman, cocreator of RSA (public-key) encryption, consulted on the movie. The [[ViewerFriendlyInterface visual representation]], on the other hand, is baloney.
Is there an issue? Send a MessageReason:
None


Modern cryptography is a very, very, very serious business. It can be what protects the citizens against TheMan. It can be the difference between losing a war or winning it. It can be the difference between making millions of dollars off a new invention, or letting the competition find out, overtake you and run away with all the money you could have made. It can be what keeps your PornStash safe from Mom's prying eyes. It's the only barrier that separates data crackers from your bank account's details. It is also the base of communication within [[AncientConspiracy Ancient Conspiracies]], shadowy criminal organizations, perfectly legitimate corporations and [[LaResistance freedom fighters]].

Unfortunately for [[WritersCannotDoMath those who studied literature hoping to never, ever see a single number ever again]], crypto is also one of the hardest sciences in the world, drawing from fields as abstract and diverse as number theory, mathematical logic, information theory and data structures. And ciphers are just the tip of the iceberg -- there are also associated algorithms such as cryptographic hashes, pseudorandom number generators, public key algorithms, and cryptosystems like SSL, PGP, [=NaCl=], SSH, [=IPsec=] or dm-crypt that tie them all together into something useful. Needless to say, this means any research in the subject done for pretty much any purpose needs to be ''very'' accurate, or else the fictional cryptosystem will be a total and utter piece of garbage and the cryptanalysis process will be basically black magic.

to:

Modern cryptography is a very, very, very serious business. It can be At its most prosaic encryption is what protects makes all forms of online commerce possible, without which the economies of the technologically modern world would grind to a halt. More dramatically it can protect citizens against TheMan. It can be from TheMan or keep military secrets safe from spies. Broken encryption might mean the difference between losing a war or winning it. It can be the difference between making millions million of dollars off a new invention, or letting when the competition find out, overtake you and run away with all the money you could have made. It can be what keeps steals your company's new invention or just an awkward conversation about your PornStash safe from Mom's prying eyes. your parents. It's the only barrier that separates data crackers would be thieves from emptying your bank account's details. It account. And, of course, it is also the base basis of communication within for [[AncientConspiracy Ancient Conspiracies]], shadowy criminal organizations, perfectly legitimate corporations and [[LaResistance freedom fighters]].

Unfortunately for [[WritersCannotDoMath those who studied literature hoping to never, ever see a single number ever again]], crypto is also one of the hardest sciences difficult fields in the world, drawing from fields as abstract and diverse as number theory, abstract algebra, mathematical logic, information theory theory, and data structures.computer science. And ciphers are just the tip of the iceberg -- there are also associated algorithms such as cryptographic hashes, pseudorandom number generators, public key algorithms, and cryptosystems like SSL, PGP, [=NaCl=], SSH, [=IPsec=] or dm-crypt that tie them all together into something useful. Needless to say, this means any research in the subject done for pretty much any purpose needs to be ''very'' accurate, or else the fictional cryptosystem will be a total and utter piece of garbage and the cryptanalysis process will be basically black magic.
Is there an issue? Send a MessageReason:
None


* In one episode of ''Series/AgentCarter'', Carter manages to decrypt a one-time pad ''in her head''. This was at the tail end of a period where the Russians ''were'' using breakable one-time pads - during WWII, the Russians were forced to reuse some of their pads, which rendered them vulnerable to cryptanalysis - it seems highly unlikely that she would have memorized 35,000 pages of sheer gibberish on the off chance that she might encounter a message encrypted by one of them, especially since the Russians had long since figured out that the VENONA pads were vulnerable and were replacing them with newer and more secure pads as quickly as they could.

to:

* In one episode of ''Series/AgentCarter'', Carter manages to decrypt a one-time pad ''in her head''. This While this was at the tail end of a period where the Russians ''were'' using breakable one-time pads - during WWII, the Russians were forced to reuse some of their pads, which rendered them vulnerable to cryptanalysis - it seems highly unlikely that she would have memorized 35,000 pages of sheer gibberish on the off chance that she might encounter a message encrypted by one of them, especially since the Russians had long since figured out that the VENONA pads were vulnerable and were replacing them with newer and more secure pads as quickly as they could.
Is there an issue? Send a MessageReason:
None


* The "Midnight Ride" episode of Series/SleepyHollow featured a [[https://en.wikipedia.org/wiki/Vigen%C3%A8re_cipher Vigenère cipher]] in an old document by John Adams, containing instructions on how to defeat the HeadlessHorseman. The document had been preserved and was available online, but nobody had been able to decipher it, before the protagonists found the keyword. The Vigenère cipher is a real cipher, and it was believed to be unbreakable for a long time, but nowadays it can be broken in hours by a human or seconds by a computer.

to:

* The "Midnight Ride" episode of Series/SleepyHollow ''Series/SleepyHollow'' featured a [[https://en.wikipedia.org/wiki/Vigen%C3%A8re_cipher Vigenère cipher]] in an old document by John Adams, containing instructions on how to defeat the HeadlessHorseman. The document had been preserved and was available online, but nobody had been able to decipher it, before the protagonists found the keyword. The Vigenère cipher is a real cipher, and it was believed to be unbreakable for a long time, but nowadays it can be broken in hours by a human or seconds by a computer.
Is there an issue? Send a MessageReason:
None

Added DiffLines:

See the [[UsefulNotes/{{Encryption}} useful notes on encryption]] for a quick overview of how modern encryption actually works.
Is there an issue? Send a MessageReason:
None


* In ''Literature/DigitalFortress'' the NSA has a computer which is powerful enough to brute force (i.e. keep trying different passkeys until it gets the right answer) encryption. The plot is based around a new encryption algorithm which is resistant to brute force methods. This is a clear case of [[PasswordSlotMachine research failure]], since a brute force search for a solution would try every possible key until the right one was found.

to:

* In ''Literature/DigitalFortress'' by Dan Brown, the NSA has a computer which is powerful enough to brute force (i.e. keep trying different passkeys until it gets the right answer) encryption. The plot is based around a new encryption algorithm which is resistant to brute force methods. This is a clear case of [[PasswordSlotMachine research failure]], since a brute force search for a solution would try every possible key until the right one was found.



* In Desmond Bagley's ''The Tightrope Men'', the hero is captured and being questioned by enemy agents, who want to know about the high-tech whatsit he's believed to be working on. However, he's only impersonating the scientist they think he is, and he didn't get a proper briefing, so he's at a loss. Then, abruptly, he comes out with a spray of technobabble about a computer which can brute-force encryption like the one in the DanBrown example above. This scares the life out of him, because he doesn't even understand what he's saying, but it ''does'' make sense to people who know computers, so he wonders where the hell this sudden burst of information ''came from''. Incidentally, the scientist he's posing as was ''actually'' looking into a possible design for an X-ray laser, nothing to do with computers at all.

to:

* In Desmond Bagley's ''The Tightrope Men'', the hero is captured and being questioned by enemy agents, who want to know about the high-tech whatsit he's believed to be working on. However, he's only impersonating the scientist they think he is, and he didn't get a proper briefing, so he's at a loss. Then, abruptly, he comes out with a spray of technobabble about a computer which can brute-force encryption like the one in the DanBrown Creator/DanBrown example above. This scares the life out of him, because he doesn't even understand what he's saying, but it ''does'' make sense to people who know computers, so he wonders where the hell this sudden burst of information ''came from''. Incidentally, the scientist he's posing as was ''actually'' looking into a possible design for an X-ray laser, nothing to do with computers at all.

Changed: 572

Removed: 587

Is there an issue? Send a MessageReason:
None



to:

* Averted on ''Film/{{Blackhat}}'': The good guys manage to intercept an electronic message sent by the bad guys, but Hathaway (the PlayfulHacker BoxedCrook hero) points out once one of the agents asks him to decrypt the message that the message utilizes a 512-bit [[https://en.wikipedia.org/wiki/GNU_Privacy_Guard GPG]] code-theoretically, he ''would'' be able to crack it given enough time, but the "enough time" he's talking about is of a few ''months'' and they have ''at least'' hours remaining before the bad guys strike. They nearly give up on the lead as a result.



[[AC:{{Film}}]]
* Averted on ''Film/{{Blackhat}}'': The good guys manage to intercept an electronic message sent by the bad guys, but Hathaway (the PlayfulHacker BoxedCrook hero) points out once one of the agents asks him to decrypt the message that the message utilizes a 512-bit [[https://en.wikipedia.org/wiki/GNU_Privacy_Guard GPG]] code-theoretically, he ''would'' be able to crack it given enough time, but the "enough time" he's talking about is of a few ''months'' and they have ''at least'' hours remaining before the bad guys strike. They nearly give up on the lead as a result.

Is there an issue? Send a MessageReason:
None


* ''Film/{{Swordfish}}'': Stanley is shown a "Restricted Access Only" password screen. The screen conveniently says that it is using DES (Data Encryption Standard) 128-bit encryption. Then Gabriel says it is actually 512-bit encryption, and asks Stanley to use a worm, that acts as multiple worms, to find "digital footprints" throughout an encrypted network. Stanley is told to do this in sixty seconds, and already wastes the first fourteen seconds. In terms of cracking, 128-bit and 512-bit encryption bring to mind multiple dozens of computers simultaneously attempting to brute force a password over a period of days or months. Over the next minute, Stanley does not appear to be manually entering passwords, or automating the process of entering passwords by running a program, or setting up something like a botnet or server cluster, which would take too long to accomplish in under a minute. It is likely Stanley is not actually cracking, but is actually hacking, and HollywoodHacking is pretty close to magic, which in this case, means Stanley is doing whatever it is that will bring about the result that will happen to be successful. This could be as simple as opening and running the program, and letting it do what it does, while navigating the interface of the operating system. On screen, this appears as some jumbled C code, hopefully written beforehand, which may take a couple seconds to compile, if needed, and though it appears incorrect, it makes perfect sense to the program meant to interpret the code. The incomprehensible geometric interface is doing what it's supposed to, the impossible IP addresses work just fine because they refer to super duper secret computers that use those addresses, and the PERL script is also doing whatever it's supposed to do. Because, this is more about file transfer than it is about hacking. You see, a Vernam cipher, or One-Time Pad, is not going to be cracked. It will require the actual key. Now, both the computer and the network are encrypted. So, before this fancy worm gets on the network and searches for the key, unsecured, on someone's computer, let's say it already knows the key, and Stanley already knows the password and isn't telling anyone, because this movie is full of double-crossing and by the end you don't have information about what the hell's going on, giving Stanley all the time he needs to enter the correct password.

to:

* ''Film/{{Swordfish}}'': Stanley is shown a "Restricted Access Only" password screen. The screen conveniently says that it is using DES (Data Encryption Standard) 128-bit encryption. Then Gabriel says it is actually 512-bit encryption, and asks Stanley to use a worm, that acts as multiple worms, to find "digital footprints" throughout an encrypted network. Stanley is told to do this in sixty seconds, and already wastes the first fourteen seconds. In terms of cracking, 128-bit and 512-bit encryption bring to mind multiple dozens of computers simultaneously attempting to brute force a password over a period of days or months. Over the next minute, Stanley does not appear to be manually entering passwords, or automating the process of entering passwords by running a program, or setting up something like a botnet or server cluster, which would take too long to accomplish in under a minute. It is likely Stanley is not actually cracking, but is actually hacking, and HollywoodHacking is pretty close to magic, which in this case, means Stanley is doing whatever it is that will bring about the result that will happen to be successful. This could be as simple as opening and running the program, and letting it do what it does, while navigating the interface of the operating system. On screen, this appears as some jumbled C code, hopefully written beforehand, which may take a couple seconds to compile, if needed, and though it appears incorrect, it makes perfect sense to the program meant to interpret the code. The incomprehensible geometric interface is doing what it's supposed to, the impossible IP addresses work just fine because they refer to super duper secret computers that use those addresses, and the PERL script is also doing whatever it's supposed to do. Because, this is more about file transfer than it is about hacking. You see, a Vernam cipher, or One-Time Pad, is not going to be cracked. It will require the actual encryption key. Now, both the computer and the network are encrypted. So, before this fancy worm gets on the network and searches for the key, unsecured, on someone's computer, let's say it already knows the key, and Stanley already knows the password and isn't telling anyone, because this movie is full of double-crossing and by the end you don't have information about what the hell's going on, giving Stanley all the time he needs to enter the correct password.
Is there an issue? Send a MessageReason:
None




to:

\n* Averted realistically in ''VideoGame/MegaManBattleNetwork''. [=MegaMan.EXE=] cannot crack open the heavily-encrypted Purple Mystery Data item containers he can find while traveling the Internet with his own abilities, and has to resort to purpose-built Unlocker sub-programs to unpack them. He also cannot spoof security certificates to enter heavy-security zones and has to retrieve passwords, ID data, and security certificates to get past these barriers.

Is there an issue? Send a MessageReason:

Added DiffLines:

* Justified in ''FanFic/HeroesOfTheDeskRepercussions'' since the tech doing the cracking is hundreds of years more advanced (2500s versus 2015) and specifically issued to people whose job it is to break into places (Ghosts like [[SuperSoldier Nova Terra]]).
Is there an issue? Send a MessageReason:
None


* ''TheSarahConnorChronicles'': Of course John can break the encryption of Sarkissian's hdd.

to:

* ''TheSarahConnorChronicles'': ''Series/TerminatorTheSarahConnorChronicles'': Of course John can break the encryption of Sarkissian's hdd.
Is there an issue? Send a MessageReason:
None


* ''Film/{{Swordfish}}'': Stanley is shown a "Restricted Access Only" password screen. The screen conveniently says that it is using DES (Data Encryption Standard) 128-bit encryption. Then Gabriel says it is actually 512-bit encryption, and asks Stanley to use a worm, that acts as multiple worms, to find "digital footprints" throughout an encrypted network. Stanley is told to do this in sixty seconds, and already wastes the first fourteen seconds. In terms of cracking, 128-bit and 512-bit encryption bring to mind multiple dozens of computers simultaneously attempting to brute force a password over a period of days or months. Over the next minute, Stanley does not appear to be manually entering passwords, or automating the process of entering passwords by running a program, which would take too long to accomplish in under a minute. It is likely Stanley is not actually cracking, but is actually hacking, and HollywoodHacking is pretty close to magic, which in this case, means Stanley is doing whatever it is that will bring about the result that will happen to be successful. This could be as simple as opening and running the program, and letting it do what it does, while navigating the interface of the operating system. On screen, this appears as some jumbled C code, hopefully written beforehand, which may take a couple seconds to compile, if needed, and though it appears incorrect, it makes perfect sense to the program meant to interpret the code. The incomprehensible geometric interface is doing what it's supposed to, the impossible IP addresses work just fine because they refer to super duper secret computers that use those addresses, and the PERL script is also doing whatever it's supposed to do. Because, this is more about file transfer than it is about hacking. You see, a Vernam cipher, or One-Time Pad, is not going to be cracked. It will require the actual key. Now, both the computer and the network are encrypted. So, before this fancy worm gets on the network and searches for the key, unsecured, on someone's computer, let's say it already knows the key, and Stanley already knows the password and isn't telling anyone, because this movie is full of double-crossing and by the end you don't have information about what the hell's going on, giving Stanley all the time he needs to enter the correct password.

to:

* ''Film/{{Swordfish}}'': Stanley is shown a "Restricted Access Only" password screen. The screen conveniently says that it is using DES (Data Encryption Standard) 128-bit encryption. Then Gabriel says it is actually 512-bit encryption, and asks Stanley to use a worm, that acts as multiple worms, to find "digital footprints" throughout an encrypted network. Stanley is told to do this in sixty seconds, and already wastes the first fourteen seconds. In terms of cracking, 128-bit and 512-bit encryption bring to mind multiple dozens of computers simultaneously attempting to brute force a password over a period of days or months. Over the next minute, Stanley does not appear to be manually entering passwords, or automating the process of entering passwords by running a program, or setting up something like a botnet or server cluster, which would take too long to accomplish in under a minute. It is likely Stanley is not actually cracking, but is actually hacking, and HollywoodHacking is pretty close to magic, which in this case, means Stanley is doing whatever it is that will bring about the result that will happen to be successful. This could be as simple as opening and running the program, and letting it do what it does, while navigating the interface of the operating system. On screen, this appears as some jumbled C code, hopefully written beforehand, which may take a couple seconds to compile, if needed, and though it appears incorrect, it makes perfect sense to the program meant to interpret the code. The incomprehensible geometric interface is doing what it's supposed to, the impossible IP addresses work just fine because they refer to super duper secret computers that use those addresses, and the PERL script is also doing whatever it's supposed to do. Because, this is more about file transfer than it is about hacking. You see, a Vernam cipher, or One-Time Pad, is not going to be cracked. It will require the actual key. Now, both the computer and the network are encrypted. So, before this fancy worm gets on the network and searches for the key, unsecured, on someone's computer, let's say it already knows the key, and Stanley already knows the password and isn't telling anyone, because this movie is full of double-crossing and by the end you don't have information about what the hell's going on, giving Stanley all the time he needs to enter the correct password.
Is there an issue? Send a MessageReason:
None


* ''Film/{{Swordfish}}'': Stanley is shown a "Restricted Access Only" password screen. The screen conveniently says that it is using DES (Data Encryption Standard) 128-bit encryption. Then Gabriel says it is actually 512-bit encryption, and asks Stanley to use a worm, that acts as multiple worms, to find "digital footprints" throughout an encrypted network. Stanley is told to do this in sixty seconds, and already wastes the first fourteen seconds. In terms of cracking, 128-bit and 512-bit encryption bring to mind multiple computers simultaneously attempting to brute force a password over a period of days or months. Over the next minute, Stanley does not appear to be manually entering passwords, or automating the process of entering passwords by running a program, which would take too long to accomplish in under a minute. It is likely Stanley is not actually cracking, but is actually hacking, and HollywoodHacking is pretty close to magic, which in this case, means Stanley is doing whatever it is that will bring about the result that will happen to be successful. This could be as simple as opening and running the program, and letting it do what it does, while navigating the interface of the operating system. On screen, this appears as some jumbled C code, hopefully written beforehand, which may take a couple seconds to compile, if needed, and though it appears incorrect, it makes perfect sense to the program meant to interpret the code. The incomprehensible geometric interface is doing what it's supposed to, the impossible IP addresses work just fine because they refer to super duper secret computers that use those addresses, and the PERL script is also doing whatever it's supposed to do. Because, this is more about file transfer than it is about hacking. You see, a Vernam cipher, or One-Time Pad, is not going to be cracked. It will require the actual key. Now, both the computer and the network are encrypted. So, before this fancy worm gets on the network and searches for the key, unsecured, on someone's computer, let's say it already knows the key, and Stanley already knows the password and isn't telling anyone, because this movie is full of double-crossing and by the end you don't have information about what the hell's going on, giving Stanley all the time he needs to enter the correct password.

to:

* ''Film/{{Swordfish}}'': Stanley is shown a "Restricted Access Only" password screen. The screen conveniently says that it is using DES (Data Encryption Standard) 128-bit encryption. Then Gabriel says it is actually 512-bit encryption, and asks Stanley to use a worm, that acts as multiple worms, to find "digital footprints" throughout an encrypted network. Stanley is told to do this in sixty seconds, and already wastes the first fourteen seconds. In terms of cracking, 128-bit and 512-bit encryption bring to mind multiple dozens of computers simultaneously attempting to brute force a password over a period of days or months. Over the next minute, Stanley does not appear to be manually entering passwords, or automating the process of entering passwords by running a program, which would take too long to accomplish in under a minute. It is likely Stanley is not actually cracking, but is actually hacking, and HollywoodHacking is pretty close to magic, which in this case, means Stanley is doing whatever it is that will bring about the result that will happen to be successful. This could be as simple as opening and running the program, and letting it do what it does, while navigating the interface of the operating system. On screen, this appears as some jumbled C code, hopefully written beforehand, which may take a couple seconds to compile, if needed, and though it appears incorrect, it makes perfect sense to the program meant to interpret the code. The incomprehensible geometric interface is doing what it's supposed to, the impossible IP addresses work just fine because they refer to super duper secret computers that use those addresses, and the PERL script is also doing whatever it's supposed to do. Because, this is more about file transfer than it is about hacking. You see, a Vernam cipher, or One-Time Pad, is not going to be cracked. It will require the actual key. Now, both the computer and the network are encrypted. So, before this fancy worm gets on the network and searches for the key, unsecured, on someone's computer, let's say it already knows the key, and Stanley already knows the password and isn't telling anyone, because this movie is full of double-crossing and by the end you don't have information about what the hell's going on, giving Stanley all the time he needs to enter the correct password.

Changed: 2336

Is there an issue? Send a MessageReason:
None



to:

* ''Film/{{Swordfish}}'': Stanley is shown a "Restricted Access Only" password screen. The screen conveniently says that it is using DES (Data Encryption Standard) 128-bit encryption. Then Gabriel says it is actually 512-bit encryption, and asks Stanley to use a worm, that acts as multiple worms, to find "digital footprints" throughout an encrypted network. Stanley is told to do this in sixty seconds, and already wastes the first fourteen seconds. In terms of cracking, 128-bit and 512-bit encryption bring to mind multiple computers simultaneously attempting to brute force a password over a period of days or months. Over the next minute, Stanley does not appear to be manually entering passwords, or automating the process of entering passwords by running a program, which would take too long to accomplish in under a minute. It is likely Stanley is not actually cracking, but is actually hacking, and HollywoodHacking is pretty close to magic, which in this case, means Stanley is doing whatever it is that will bring about the result that will happen to be successful. This could be as simple as opening and running the program, and letting it do what it does, while navigating the interface of the operating system. On screen, this appears as some jumbled C code, hopefully written beforehand, which may take a couple seconds to compile, if needed, and though it appears incorrect, it makes perfect sense to the program meant to interpret the code. The incomprehensible geometric interface is doing what it's supposed to, the impossible IP addresses work just fine because they refer to super duper secret computers that use those addresses, and the PERL script is also doing whatever it's supposed to do. Because, this is more about file transfer than it is about hacking. You see, a Vernam cipher, or One-Time Pad, is not going to be cracked. It will require the actual key. Now, both the computer and the network are encrypted. So, before this fancy worm gets on the network and searches for the key, unsecured, on someone's computer, let's say it already knows the key, and Stanley already knows the password and isn't telling anyone, because this movie is full of double-crossing and by the end you don't have information about what the hell's going on, giving Stanley all the time he needs to enter the correct password.
Is there an issue? Send a MessageReason:
None


* Averted on ''Film/{{Blackhat}}'': The good guys manage to intercept an electronic message sent by the bad guys, but Hathaway (the PlayfulHacker BoxedCrook hero) points out once one of the agents asks him to decrypt the message that the message utilizes a 512-bit [[https://en.wikipedia.org/wiki/GNU_Privacy_Guard GPG]] code-theoretically, he ''would'' be able to crack it in time, but it would take him at least a few ''months'' and they have ''at least'' hours remaining before the bad guys strike. They nearly give up on the lead as a result.


to:

* Averted on ''Film/{{Blackhat}}'': The good guys manage to intercept an electronic message sent by the bad guys, but Hathaway (the PlayfulHacker BoxedCrook hero) points out once one of the agents asks him to decrypt the message that the message utilizes a 512-bit [[https://en.wikipedia.org/wiki/GNU_Privacy_Guard GPG]] code-theoretically, he ''would'' be able to crack it in given enough time, but it would take him at least the "enough time" he's talking about is of a few ''months'' and they have ''at least'' hours remaining before the bad guys strike. They nearly give up on the lead as a result.

Is there an issue? Send a MessageReason:
None

Added DiffLines:

[[AC:{{Film}}]]
* Averted on ''Film/{{Blackhat}}'': The good guys manage to intercept an electronic message sent by the bad guys, but Hathaway (the PlayfulHacker BoxedCrook hero) points out once one of the agents asks him to decrypt the message that the message utilizes a 512-bit [[https://en.wikipedia.org/wiki/GNU_Privacy_Guard GPG]] code-theoretically, he ''would'' be able to crack it in time, but it would take him at least a few ''months'' and they have ''at least'' hours remaining before the bad guys strike. They nearly give up on the lead as a result.

Is there an issue? Send a MessageReason:
None



to:

* The "Midnight Ride" episode of Series/SleepyHollow featured a [[https://en.wikipedia.org/wiki/Vigen%C3%A8re_cipher Vigenère cipher]] in an old document by John Adams, containing instructions on how to defeat the HeadlessHorseman. The document had been preserved and was available online, but nobody had been able to decipher it, before the protagonists found the keyword. The Vigenère cipher is a real cipher, and it was believed to be unbreakable for a long time, but nowadays it can be broken in hours by a human or seconds by a computer.

Top