xboxscene.org forums

Author Topic: How Does Ms Authenticate  (Read 30 times)

kaylapuppy

  • Archived User
  • Full Member
  • *
  • Posts: 182
How Does Ms Authenticate
« on: September 01, 2003, 08:30:00 AM »

I was just wondering if someone could explain how MS authenticates its XBOX games ?
And also why it hasn't been hacked before ? If someone knew the signature, could they just implement it in a one of the dashboard programs, and make a mod chip unnecesary ? Just trying to learn how it all works.

Thanks for any serious responses.

Regards,
KP
Logged

Heet

  • Archived User
  • Hero Member
  • *
  • Posts: 2809
How Does Ms Authenticate
« Reply #1 on: September 01, 2003, 12:38:00 PM »

private key?
Logged

gamingguru

  • Archived User
  • Full Member
  • *
  • Posts: 162
How Does Ms Authenticate
« Reply #2 on: September 01, 2003, 01:03:00 PM »

Ya the security key could be put on a disk that has homebrew stuff on it and it, would be able to run on a stock xbox.


Logged

BenJeremy

  • Archived User
  • Hero Member
  • *
  • Posts: 5645
How Does Ms Authenticate
« Reply #3 on: September 01, 2003, 04:45:00 PM »

Please read the thread "Things you must know about the Xbox" in the General Chat forum.

The explanation is in there, I do believe. If not, I'll add it shortly.

Read the entire thread, anyway, for good measure. It's really required reading for all Xbox modders.
Logged

kaylapuppy

  • Archived User
  • Full Member
  • *
  • Posts: 182
How Does Ms Authenticate
« Reply #4 on: September 01, 2003, 06:31:00 PM »

Thanks BJ. I kinda thought that was the way it was done, but I guess this private key is so secret that if it ever got out MS would probably just pull the plug on xbox all together.

Regards
KP
Logged

EvilWays

  • Archived User
  • Hero Member
  • *
  • Posts: 909
How Does Ms Authenticate
« Reply #5 on: September 02, 2003, 05:16:00 AM »

The Xbox uses a 2048-bit RC4 private/public key. This is an asymmetrical encryption/decription system. This means that even if you have one key, you can't do both functions, whereas with a symmetrical encryption/decryption system, if you have the key, then the whole scheme of protection is dead as a person could then do both tasks with the one key. Damn, only one day in Network Security Fundamentals class and I can remember all this shit (ironically, taught by someone who has/does work for the gov't). laugh.gif
Logged