Changes

No change in size ,  04:47, 8 June 2008
m
typo
Line 3: Line 3:  
=== Definitions ===
 
=== Definitions ===
 
* [http://en.wikipedia.org/wiki/Encryption Encryption]: Technology used to prevent unauthorized parties from viewing data.  The Wii uses [http://en.wikipedia.org/wiki/Advanced_Encryption_Standard AES]-128-CBC.
 
* [http://en.wikipedia.org/wiki/Encryption Encryption]: Technology used to prevent unauthorized parties from viewing data.  The Wii uses [http://en.wikipedia.org/wiki/Advanced_Encryption_Standard AES]-128-CBC.
** [http://en.wikipedia.org/wiki/Symmetric-key_algorithm Symmetric Encryption]: The same key is used for both encryption and decryption.  AES is a symmetric cypher.
+
** [http://en.wikipedia.org/wiki/Symmetric-key_algorithm Symmetric Encryption]: The same key is used for both encryption and decryption.  AES is a symmetric cipher.
 
* [http://en.wikipedia.org/wiki/Hash_function Hashing]: Technology used to detect modification of data.  The Wii uses both [http://en.wikipedia.org/wiki/SHA_hash_functions SHA-1] and [http://en.wikipedia.org/wiki/MD5 MD5].
 
* [http://en.wikipedia.org/wiki/Hash_function Hashing]: Technology used to detect modification of data.  The Wii uses both [http://en.wikipedia.org/wiki/SHA_hash_functions SHA-1] and [http://en.wikipedia.org/wiki/MD5 MD5].
 
* [http://en.wikipedia.org/wiki/Digital_signature Signing]: Technology used to prevent unauthorized parties from modifying (changing, editing) data.  (Generally, this is a combination of encryption and hashing.)  For the purposes of signing, the Wii uses [http://en.wikipedia.org/wiki/RSA RSA] and [http://en.wikipedia.org/wiki/Elliptic_curve_cryptography ECC].  Signing is an asymmetric algorithm: a signature can be verified by a party without sufficient information to produce a signature.
 
* [http://en.wikipedia.org/wiki/Digital_signature Signing]: Technology used to prevent unauthorized parties from modifying (changing, editing) data.  (Generally, this is a combination of encryption and hashing.)  For the purposes of signing, the Wii uses [http://en.wikipedia.org/wiki/RSA RSA] and [http://en.wikipedia.org/wiki/Elliptic_curve_cryptography ECC].  Signing is an asymmetric algorithm: a signature can be verified by a party without sufficient information to produce a signature.
4

edits