TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Ask HN: What did Sony do wrong with PS3 signing?

1 点作者 dt3ft7 个月前
Background info: https:&#x2F;&#x2F;arstechnica.com&#x2F;gaming&#x2F;2010&#x2F;12&#x2F;ps3-hacked-through-poor-implementation-of-cryptography&#x2F;<p>From the article:<p>&gt; But when fail0verflow worked backwards from generated keys, they found out that a parameter that should have been randomized for each key generation wasn&#x27;t being randomized at all. Instead, the PS3 was using the same number for that variable, every single time, making it easy to work out acceptable keys.<p>Which parameter are they talking about? Seed?

1 comment

stop507 个月前
For publickey cryptography you need a lot of high quality random numbers, but those are tricky to generate, so sony saved time and reused some of them to save cpu time.