Background info: https://arstechnica.com/gaming/2010/12/ps3-hacked-through-poor-implementation-of-cryptography/<p>From the article:<p>> But when fail0verflow worked backwards from generated keys, they found out that a parameter that should have been randomized for each key generation wasn't being randomized at all. Instead, the PS3 was using the same number for that variable, every single time, making it easy to work out acceptable keys.<p>Which parameter are they talking about? Seed?
For publickey cryptography you need a lot of high quality random numbers, but those are tricky to generate, so sony saved time and reused some of them to save cpu time.