• Announcements

    • khawk

      Download the Game Design and Indie Game Marketing Freebook   07/19/17

      GameDev.net and CRC Press have teamed up to bring a free ebook of content curated from top titles published by CRC Press. The freebook, Practices of Game Design & Indie Game Marketing, includes chapters from The Art of Game Design: A Book of Lenses, A Practical Guide to Indie Game Marketing, and An Architectural Approach to Level Design. The GameDev.net FreeBook is relevant to game designers, developers, and those interested in learning more about the challenges in game development. We know game development can be a tough discipline and business, so we picked several chapters from CRC Press titles that we thought would be of interest to you, the GameDev.net audience, in your journey to design, develop, and market your next game. The free ebook is available through CRC Press by clicking here. The Curated Books The Art of Game Design: A Book of Lenses, Second Edition, by Jesse Schell Presents 100+ sets of questions, or different lenses, for viewing a game’s design, encompassing diverse fields such as psychology, architecture, music, film, software engineering, theme park design, mathematics, anthropology, and more. Written by one of the world's top game designers, this book describes the deepest and most fundamental principles of game design, demonstrating how tactics used in board, card, and athletic games also work in video games. It provides practical instruction on creating world-class games that will be played again and again. View it here. A Practical Guide to Indie Game Marketing, by Joel Dreskin Marketing is an essential but too frequently overlooked or minimized component of the release plan for indie games. A Practical Guide to Indie Game Marketing provides you with the tools needed to build visibility and sell your indie games. With special focus on those developers with small budgets and limited staff and resources, this book is packed with tangible recommendations and techniques that you can put to use immediately. As a seasoned professional of the indie game arena, author Joel Dreskin gives you insight into practical, real-world experiences of marketing numerous successful games and also provides stories of the failures. View it here. An Architectural Approach to Level Design This is one of the first books to integrate architectural and spatial design theory with the field of level design. The book presents architectural techniques and theories for level designers to use in their own work. It connects architecture and level design in different ways that address the practical elements of how designers construct space and the experiential elements of how and why humans interact with this space. Throughout the text, readers learn skills for spatial layout, evoking emotion through gamespaces, and creating better levels through architectural theory. View it here. Learn more and download the ebook by clicking here. Did you know? GameDev.net and CRC Press also recently teamed up to bring GDNet+ Members up to a 20% discount on all CRC Press books. Learn more about this and other benefits here.
Sign in to follow this  
Followers 0
Butabee

Encryption with time played

10 posts in this topic

I was thinking of encrypting data with total time played down to the minute. The time would be kept track of seperately on the client and the server so it never has to be transmitted.

 

I'm not sure how secure it would be so I was hoping for some input.

0

Share this post


Link to post
Share on other sites

Your question is really vague. What data are you encrypting? What kind of server and client? Who encrypts the data? For what reason are you encrypting data?

0

Share this post


Link to post
Share on other sites

Passwords. Custom game server and client. Client encypts, server decrypts. I don't want to transfer plaintext passwords in case of sniffing.

0

Share this post


Link to post
Share on other sites

I could try a minute behind or ahead if the decrypted message doesn't match the password, which I guess makes it down to 3 minutes. Unless the hacker was monitoring a player from his very fist connection ever, he'd have to make a pretty good guess to get the total time played. After an incorrect guess in the 3 minute range, I could just ban.

 

I'm using lidgren for my networking and would be using the minutes played as the encryption key.

 

What existing encryption can I use with lidgren?

0

Share this post


Link to post
Share on other sites

Or you can use asymmetrical encryption like RSA. Then you can let the server send the encryption key for a symmetrical encryption protocol. I don't see the need to create some custom protocol...

0

Share this post


Link to post
Share on other sites

Wouldn't it go like this:

- time 0: player joins game and sends pw

- hacker knows time is most likely 0 and "decrypts" the pw

 

Thats a stupid encryption method.

0

Share this post


Link to post
Share on other sites

Wouldn't it go like this:

- time 0: player joins game and sends pw

- hacker knows time is most likely 0 and "decrypts" the pw

 

Thats a stupid encryption method.

That would only work for a players very fist session ever... which I already mentioned.

 

Anywas since all I'm gonna do is catch flak for mentioning this I'll just use asymmetrical encryption.

0

Share this post


Link to post
Share on other sites

I was thinking of encrypting data with total time played down to the minute. The time would be kept track of seperately on the client and the server so it never has to be transmitted.

 

I'm not sure how secure it would be so I was hoping for some input.

You'd have a very limited pool of keys, you could brute force all of them in less than a second.

0

Share this post


Link to post
Share on other sites

For Butabee, I cannot imagine anything your protection scheme attacks against that cannot be defeated by old fashioned methods. A simple memory inspector can compromise just about any game client.

 

So what if your data is encrypted when you write it on disk, and the values are encrypted when traveling across the wire.  They are open and accessible during processing. If the data is available on the client machine in any way whatsoever, a skilled attacker can find it and use it.

1

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!


Register a new account

Sign in

Already have an account? Sign in here.


Sign In Now
Sign in to follow this  
Followers 0