How a not so random number broke the PS3

Ғылым және технология

This video explains how Sony's flawed implementation of elliptic curve cryptography enabled hackers to gain control of the Playstation 3 and run their own software on it.
This video is part of the MegaFavNumbers project. Maths KZreadrs have come together to make videos about their favourite numbers bigger than one million, which is called #MegaFavNumbers.
My links:
Website: zeta-two.com/
Twitter: / zetatwo
Patreon: / zetatwo
Check out other security creators at: securitycreators.video/
Intro to ECC: andrea.corbellini.name/2015/0...
Script (including links to more sources): docs.google.com/document/d/1r...
Images used (Creative Commons):
en.wikipedia.org/wiki/File:Pr...
commons.wikimedia.org/wiki/Fi...
commons.wikimedia.org/wiki/Fi...
en.wikipedia.org/wiki/File:Ge...
xkcd.com/221/

Пікірлер: 26

  • @singingbanana
    @singingbanana3 жыл бұрын

    I loved this.

  • @ZetaTwo

    @ZetaTwo

    3 жыл бұрын

    Thank you James! Means a lot, and thanks for inspiring to this by creating this campaign.

  • @H0RRAX
    @H0RRAX3 жыл бұрын

    This is my favorite video in this series (so far)! Have you thought of doing more videos like that, where you give an in dept view of popular exploit of the past?

  • @ZetaTwo

    @ZetaTwo

    3 жыл бұрын

    Thank you! Glad that you liked it. I have not really thought about what to do next since I was really pushing to get this out before the deadline however that is actually a pretty good suggestion. I noticed that when I was researching this topic that most popular sources were way too simplified or even wrong about how this exploit worked which actually slowed down my work significantly. If you have any specific suggestions, feel free to send them. I have some hectic weeks coming up but I hope to be able to release more videos in a somewhat regular schedule in a not too distant future.

  • @icenberg5908
    @icenberg59082 жыл бұрын

    I must say an incredible video.

  • @ZetaTwo

    @ZetaTwo

    2 жыл бұрын

    Thank you! Glad that you liked it.

  • @MatthewOBrien314
    @MatthewOBrien3143 жыл бұрын

    Really nice video, thanks for making it.

  • @alejoesteban4032
    @alejoesteban40323 жыл бұрын

    Cool video, I'll rewatch it in the future.

  • @mattiasgrenfeldt174
    @mattiasgrenfeldt1743 жыл бұрын

    Good job! Very nice video! :)

  • @dennisdubrefjord5577
    @dennisdubrefjord55773 жыл бұрын

    This is great, thank you!

  • @_nit
    @_nit3 жыл бұрын

    This was a fantastic explanation. Incredible video dude.

  • @ZetaTwo

    @ZetaTwo

    3 жыл бұрын

    Thanks! Glad you liked it!

  • @michaelraasch5496
    @michaelraasch5496 Жыл бұрын

    Great explanation!

  • @ZetaTwo

    @ZetaTwo

    Жыл бұрын

    Glad you liked it!

  • @zoenagy9458
    @zoenagy9458 Жыл бұрын

    wow super hard math

  • @pitchpitch8172
    @pitchpitch81723 жыл бұрын

    thanks for all videos Mr Zeta i'm from Algeria, and initiating in reverse engineering, since no such thing exists in my country. currently i'm working on reversing an ECU car, and throw my research on internet i've found out that my file looks like the one you solved in RHme2 five years ago 2017, the " FRIDGEJIT" .... got some guidness from liveoverflow, but your video is not complete. would you plz share your solution with me, cause i don't find it any where. i'm stuck with the OS program built on top of the application, no progress, i guess the passion for reverse engineering is not enaugh, u got to have skills and background. thanks in advance.

  • @ZetaTwo

    @ZetaTwo

    3 жыл бұрын

    I have not documented my solution to that challenge in an easily consumable way. The video LiveOverflow has is all there is. Feel free to send an email to calle.svensson@zeta-two.com with a little bit more description of what you are doing and I will try to point you in the right direction.

  • @rosiefay7283
    @rosiefay72832 жыл бұрын

    1:12 "i do not condone piracy" indeed. 12:51 This implies that the recipient, knowing s, can easily find s^{-1}. OK, I can see how that might be easy if it's easy to factorise n-1. But for one thing, that might not be easy. And for another, didn't you imply that an easier step is secure because it's practically impossible to calculate a modular inverse?

  • @ZetaTwo

    @ZetaTwo

    2 жыл бұрын

    s^{-1} is just the inverse of s (mod n) which can be efficiently calculated using for example the Extended Euclidean algorithm. No factorization needed. The thing that is difficult to calculate is the discrete logarithm which is a separate problem.

  • @valcron-1000
    @valcron-10003 жыл бұрын

    Amazing content. Why would they even use a fixed number for such task? How could this happen?

  • @ZetaTwo

    @ZetaTwo

    3 жыл бұрын

    Thank a lot! I can come up with a few hypotheses. It could have been that they misunderstood the specification and thought you could generate one random number for everything, or maybe it was some kind of test/debug value to get predictable output for testing or something, or maybe it was a bug in their code.

  • @FloydMaxwell

    @FloydMaxwell

    3 жыл бұрын

    @@ZetaTwo Or a techie wanted to create a flaw on purpose

  • @ZetaTwo

    @ZetaTwo

    3 жыл бұрын

    @@FloydMaxwell If you want to go more into conspiracy territory, yes that is also a theoretical possibility.

  • @LiEnby

    @LiEnby

    5 ай бұрын

    most likely answer is beacause calling c's rand() function uses a fixed seed by default unless you use srand() to set the seed first.

  • @mamailo2011
    @mamailo20113 жыл бұрын

    Loved the video, thanks Sony; dudes, next time hire a profesional mathematician

  • @bloomtwig76
    @bloomtwig763 жыл бұрын

    🤔

Келесі