Line 3:
Line 3:
=== Definitions ===
=== Definitions ===
* [http://en.wikipedia.org/wiki/Encryption Encryption]: Technology used to prevent unauthorized parties from viewing data. The Wii uses [http://en.wikipedia.org/wiki/Advanced_Encryption_Standard AES]-128-CBC.
* [http://en.wikipedia.org/wiki/Encryption Encryption]: Technology used to prevent unauthorized parties from viewing data. The Wii uses [http://en.wikipedia.org/wiki/Advanced_Encryption_Standard AES]-128-CBC.
−
** [http://en.wikipedia.org/wiki/Symmetric-key_algorithm Symmetric Encryption]: The same key is used for both encryption and decryption. AES is a symmetric cypher.
+
** [http://en.wikipedia.org/wiki/Symmetric-key_algorithm Symmetric Encryption]: The same key is used for both encryption and decryption. AES is a symmetric cipher.
* [http://en.wikipedia.org/wiki/Hash_function Hashing]: Technology used to detect modification of data. The Wii uses both [http://en.wikipedia.org/wiki/SHA_hash_functions SHA-1] and [http://en.wikipedia.org/wiki/MD5 MD5].
* [http://en.wikipedia.org/wiki/Hash_function Hashing]: Technology used to detect modification of data. The Wii uses both [http://en.wikipedia.org/wiki/SHA_hash_functions SHA-1] and [http://en.wikipedia.org/wiki/MD5 MD5].
* [http://en.wikipedia.org/wiki/Digital_signature Signing]: Technology used to prevent unauthorized parties from modifying (changing, editing) data. (Generally, this is a combination of encryption and hashing.) For the purposes of signing, the Wii uses [http://en.wikipedia.org/wiki/RSA RSA] and [http://en.wikipedia.org/wiki/Elliptic_curve_cryptography ECC]. Signing is an asymmetric algorithm: a signature can be verified by a party without sufficient information to produce a signature.
* [http://en.wikipedia.org/wiki/Digital_signature Signing]: Technology used to prevent unauthorized parties from modifying (changing, editing) data. (Generally, this is a combination of encryption and hashing.) For the purposes of signing, the Wii uses [http://en.wikipedia.org/wiki/RSA RSA] and [http://en.wikipedia.org/wiki/Elliptic_curve_cryptography ECC]. Signing is an asymmetric algorithm: a signature can be verified by a party without sufficient information to produce a signature.