Breaking ECDSA (Elliptic Curve Cryptography) - rhme2 Secure Filesystem v1.92r1 (crypto 150)

preview_player
Показать описание
We are going to recover a ECDSA private key from bad signatures. Same issue the Playstation 3 had that allowed it to be hacked.

-=[ 🔴 Stuff I use ]=-

-=[ ❤️ Support ]=-

-=[ 🐕 Social ]=-

-=[ 📄 P.S. ]=-

All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.

#CTF #Cryptography
Рекомендации по теме
Комментарии
Автор

“from hashlib impoer sha1” ahhh you drove me crazy right here. I wanna correct it so bad

驼羊-hr
Автор

Great video! I love the math behind elliptic curve crypto! I'm sure i wouldn't have been able to figure it out, but I can remember my lecturer emphasizing that k needed to be recalculated every time, last year at uni :D
It's important to understand such a protocol before you implement it!

Chrille
Автор

Gutes Video, wie immer :) Jede Woche freue ich mich auf ein neues Video von dir und ich werde nie enttäuscht. Unendlich interessante Inhalte und jemanden der es perfekt erklärt. Herzlichen Dank, deine Videos sind wahrlich eine Bereicherung.

cronax
Автор

This is mindblowing. I'm a bit late to watch this video (around 5 days late), but it's great that I found it.

cyancoyote
Автор

Very nice channel bro, it will go up for sure! :) Keep going!!!

meksaldi
Автор

From the Wiki article, "In December 2010, a group calling itself *fail0verflow* announced recovery of the ECDSA private key used by Sony to sign software for the PlayStation 3 game console." Illuminati confirmed.

JGunlimited
Автор

Very, very nice video. I couldn't get my head around ECDSA and the use of the random number k until I saw your video. I just need to rewatch it a hundred times or so, lol.

baatar
Автор

i love how like the only visited link was the "conspiracy" one

arcaynlastname
Автор

You should put up a Patreon, I am sure many of us would love to be able to give you beer money! Awesome video as always.

addisonwilson
Автор

can you put some ctfs please, you explain very well Keep going man

hatimhamd
Автор

You deserve waaaay more subs than you have!
Awesome videos man, keep them making! (y)

yashacker
Автор

Major sticking point for me on this one was that they used SHA1 as the hash algorithm. I tried with SHA2 for way too long before trying SHA1 and solving it in seconds....

sewid
Автор

2:41 how to get search results automatically without pressing enter?

a.yashwanth
Автор

Ha, really liked this one, wish I could have participated myself :) Thanks again for the upload, great as always

TonelessR
Автор

Can we turn a fake private key into a real one? 1 main network address has been converted to base 38 and became a pub key. Can it be changed further? Is there any limit?

cabbarjavad
Автор

The value of K is the year of the ctf, lol

rogervanbommel
Автор

well done! great info. but what if the "r" given is not the same? is it still possible to solve for "k" if we have different "r"?

quinj
Автор

are you gonna make a video about wannacry?

samsempl
Автор

Question, lets say when this challenge site is over, can I go back and do the challenges myself?

coolstory
Автор

why are k(0x7e0) and dA(0x2a) so small? can I just brute force them to solve the challenge?

zzh