Breaking News

Thermaltake Launches AW360/420 AIO Liquid Cooler and WAir CPU Cooler for Workstations be quiet! redefines versatility with new Light Base 500 LX and Light Base 500 PC cases Crucial’s UK promos for Amazon’s Prime Day Deals 2025 JEDEC Sets the Stage for the Next Leap in Flash Storage With UFS 5.0 MSI Launches Its First Back-Connection Graphics Card—GeForce RTX 5070 Ti 16G VENTUS 3X PZ Series

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

Weak Cryptography Keys Exploit PS3's Security Measures Against 
Running Linux

Weak Cryptography Keys Exploit PS3's Security Measures Against Running Linux

Gaming Dec 31,2010 0

Despite Sony's "efforts" to patch the security holes of the PS3 game console and lock out Linux sofware apps, hackers are now claiming that they have managed to gain access to the system's innards by taking advantage PS3's poor use of public key cryptography. According to a team of hackers called "fail0verflow," the PS3 private signing key or ECDSA signature was exposed (Digital Signature Algorithm). The group located this private cryptographic key needed to sign off on high-level operations. Such keays are generally hard to be exposed and according to their complexity, they require running many generations of keys to crack.

The hackers worked backawrds: They used the generated keys and soon they discovered that a parameter (k) that should have been randomized for each key generation wasn't being randomized at all. And since the PS3 was using the same number for that variable, it was easy to work out acceptable keys using simle algebra. If you are interested in cryptogry, you may read this blog post describing how essential the use of a random parameter (k) in the DSA is in order a system to be safe against hacks.

"It is extremely important that all bits of parameter k be unique, unpredictable, and secret. With two DSA signatures on separate messages with the same k, you can recover the signer?s private key," the team says.

At the 27th Chaos Communication Congress, the team talked about various hacks that users can use to gain control of their PS3 and make it run their own code.

2010 saw the first hacks for the Playstation 3, soon after Sony removed Other OS functionality. The team described how Sony went wrong when designing its security system, and show how these holes can be used to gain control over the system and bring Linux back to the PS3.

Tags: Playstation 3
Previous Post
Mozilla And Tsinghua University Develop IPv6 Browser
Next Post
Facebook Tops Google As Most Visited Site in U.S.

Related Posts

  • PlayStation Now Subscriptions Come to PS3

  • Sony To Launch Video-streaming Service In The U.S.

  • Some Sony TVs Get Support for PS3 Games

  • PS3 Update v.4.50 Launches Today

  • Sony Says 'Last Of Us Sales' Is The Fastest Selling PS3 Title of 2013

  • New Firmware For Sony PS3 Fixes Last week's Issues

  • Sony Pulls Faulty Firmware For PlayStation 3

  • Gran Turismo 6 is Coming This Fall

Latest News

Thermaltake Launches AW360/420 AIO Liquid Cooler and WAir CPU Cooler for Workstations
Cooling Systems

Thermaltake Launches AW360/420 AIO Liquid Cooler and WAir CPU Cooler for Workstations

be quiet! redefines versatility with new Light Base 500 LX and Light Base 500 PC cases
Cooling Systems

be quiet! redefines versatility with new Light Base 500 LX and Light Base 500 PC cases

Crucial’s UK promos for Amazon’s Prime Day Deals 2025
Consumer Electronics

Crucial’s UK promos for Amazon’s Prime Day Deals 2025

JEDEC Sets the Stage for the Next Leap in Flash Storage With UFS 5.0
Cameras

JEDEC Sets the Stage for the Next Leap in Flash Storage With UFS 5.0

MSI Launches Its First Back-Connection Graphics Card—GeForce RTX 5070 Ti 16G VENTUS 3X PZ Series
GPUs

MSI Launches Its First Back-Connection Graphics Card—GeForce RTX 5070 Ti 16G VENTUS 3X PZ Series

Popular Reviews

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

Terramaster F8-SSD

Terramaster F8-SSD

be quiet! Light Mount Keyboard

be quiet! Light Mount Keyboard

be quiet! Light Base 600 LX

be quiet! Light Base 600 LX

be quiet! Pure Base 501

be quiet! Pure Base 501

Soundpeats Pop Clip

Soundpeats Pop Clip

Akaso 360 Action camera

Akaso 360 Action camera

Dragon Touch Digital Calendar

Dragon Touch Digital Calendar

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed