Changes

Jump to navigation Jump to search
301 bytes added ,  04:39, 19 March 2008
more defs
Line 5: Line 5:  
* Hashing: Technology used to detect modification of data.  The Wii uses both [http://en.wikipedia.org/wiki/SHA_hash_functions SHA-1] and [http://en.wikipedia.org/wiki/MD5 MD5].
 
* Hashing: Technology used to detect modification of data.  The Wii uses both [http://en.wikipedia.org/wiki/SHA_hash_functions SHA-1] and [http://en.wikipedia.org/wiki/MD5 MD5].
 
* Signing: Technology used to prevent unauthorized parties from modifying (changing, editing) data.  (Generally, this is a combination of encryption and hashing.)  For the purposes of signing, the Wii uses [http://en.wikipedia.org/wiki/RSA RSA] and [http://en.wikipedia.org/wiki/Elliptic_curve_cryptography ECC].
 
* Signing: Technology used to prevent unauthorized parties from modifying (changing, editing) data.  (Generally, this is a combination of encryption and hashing.)  For the purposes of signing, the Wii uses [http://en.wikipedia.org/wiki/RSA RSA] and [http://en.wikipedia.org/wiki/Elliptic_curve_cryptography ECC].
 +
* Title: In Wii terminology, a "title" is a self-contained set of code and data.  Every game is a title; a channel is a title, etc.
 +
* Content: In Wii terminology, a "content" is piece of code or data.  Discs contain one "content" per partition; channels usually contain several "contents" per title.
    
The rest of this page will assume you know the difference between symmetric and asymmetric cryptography.
 
The rest of this page will assume you know the difference between symmetric and asymmetric cryptography.
 +
 
=== Game discs ===
 
=== Game discs ===
 
Game discs are encrypted to avoid analysis, and signed to avoid modifications.
 
Game discs are encrypted to avoid analysis, and signed to avoid modifications.

Navigation menu