TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

The 3DS Cryptosystem

120 pointsby yifanluabout 9 years ago

7 comments

bostikabout 9 years ago
That was an amusing read. The big takeaways are even deliciously quotable:<p><i>The irony is that the feature designed to bring more security was the one that completely broke it.</i><p><i>Too much complexity: having lots of blocks that say “AES” and “RSA” in your plan might impress the boss, but it just adds to the attack surface. Always go with the simplest plan that secures against your threat model.</i><p>Security is hard to get right, and retrofitting security features into existing systems is ripe with very subtle traps. Add backwards compatibility into the mix and you&#x27;ve probably created a fragile Frankenstein.
评论 #11465482 未加载
评论 #11466236 未加载
userbinatorabout 9 years ago
<i>Finally, I will summarize the findings and provide a few tips to fellow engineers in hopes that these kinds of mistakes will not be made again.</i><p>On the other hand, those of us who like to actually own our hardware very much hope that these mistakes do happen again. :-)
评论 #11467141 未加载
tptacekabout 9 years ago
<a href="https:&#x2F;&#x2F;www.thoughtcrime.org&#x2F;blog&#x2F;the-cryptographic-doom-principle&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.thoughtcrime.org&#x2F;blog&#x2F;the-cryptographic-doom-pri...</a>
评论 #11466359 未加载
Jasper_about 9 years ago
A funny thing about the key generator. There was originally a project within the community to raise the funds to do a successful decap of the AES engine and key generator.<p>They successfully raised the $2000 before the person claiming to do a decap (Jl12) stole all the money and disappeared off the face of the earth.<p><a href="http:&#x2F;&#x2F;web.archive.org&#x2F;web&#x2F;20121227085042&#x2F;http:&#x2F;&#x2F;3dbrew.org&#x2F;wiki&#x2F;Fundraiser" rel="nofollow">http:&#x2F;&#x2F;web.archive.org&#x2F;web&#x2F;20121227085042&#x2F;http:&#x2F;&#x2F;3dbrew.org&#x2F;...</a><p><a href="http:&#x2F;&#x2F;web.archive.org&#x2F;web&#x2F;20140209211220&#x2F;http:&#x2F;&#x2F;3dbrew.org&#x2F;wiki&#x2F;Fundraiser" rel="nofollow">http:&#x2F;&#x2F;web.archive.org&#x2F;web&#x2F;20140209211220&#x2F;http:&#x2F;&#x2F;3dbrew.org&#x2F;...</a>
评论 #11467465 未加载
评论 #11467367 未加载
SXXabout 9 years ago
For anyone interested there is PS3 security explained and it&#x27;s one more proof that complexity don&#x27;t make system more secure:<p><a href="http:&#x2F;&#x2F;www.psdevwiki.com&#x2F;ps3&#x2F;Boot_Order#Chain_of_trust_Diagram" rel="nofollow">http:&#x2F;&#x2F;www.psdevwiki.com&#x2F;ps3&#x2F;Boot_Order#Chain_of_trust_Diagr...</a><p><a href="http:&#x2F;&#x2F;www.psdevwiki.com&#x2F;ps3&#x2F;Keys" rel="nofollow">http:&#x2F;&#x2F;www.psdevwiki.com&#x2F;ps3&#x2F;Keys</a>
wizzard0about 9 years ago
Another illustration of the classic thesis &quot;security should be built from the ground up and can&#x27;t be added later&quot;. Also shows the importance of minimizing the attack surface. Would love to hear some inside stories about discussions that ultimately led to these implementation decisions.
anon4about 9 years ago
Still, it held off for 4 years. That&#x27;s pretty much the usual lifetime of a console generation, so I&#x27;d say the system was a success.
评论 #11466031 未加载
评论 #11465974 未加载
评论 #11467078 未加载