|
You last visited: Today at 19:26
Advertisement
CO2 Cryptographic concepts
Discussion on CO2 Cryptographic concepts within the CO2 Private Server forum part of the Conquer Online 2 category.
10/30/2021, 20:46
|
#1
|
elite*gold: 0
Join Date: Jun 2009
Posts: 611
Received Thanks: 195
|
CO2 Cryptographic concepts
Hello All,
Lately I've been reading a lot about cryptography and different algorithms, for example symmetric and asymmetric algorithms, MACs and digital signatures, so I thought about learning some cryptographic concepts from CO2 aswell, as how to handles different stuff in a secure way, what would be the best way to learn the behind the features stuff, i.e is there like a base source that I could look at that would explain these stuff in a good way, or any other recommended methods?
Thanks.
|
|
|
11/02/2021, 03:32
|
#2
|
elite*gold: 0
Join Date: Jan 2008
Posts: 1,443
Received Thanks: 1,175
|
Quote:
Originally Posted by diedwarrior
Hello All,
Lately I've been reading a lot about cryptography and different algorithms, for example symmetric and asymmetric algorithms, MACs and digital signatures, so I thought about learning some cryptographic concepts from CO2 aswell, as how to handles different stuff in a secure way, what would be the best way to learn the behind the features stuff, i.e is there like a base source that I could look at that would explain these stuff in a good way, or any other recommended methods?
Thanks.
|
CO2 used symmetric key algorithms to encrypt packets. Historically, it was a custom-made stream cipher, nothing fancy. They later switched to block ciphers using the CFB64 mode (which converts the block cipher into a stream cipher, dumbed down). They used Blowfish and CAST-5. When they did that switch, they also introduced a "proper" key exchange using Diffie-Hellman, to generate the shared symmetric key. But the way it is implemented, it isn't protecting against MitM attacks.
CO2 also used RC5, a block cipher, to encrypt the password (as a single block basically). They later used I think SRP-6, but I've never looked at it.
You won't really see any uses of asymmetric key algorithms, digital signatures or even hash functions in CO2. The protocol lacks authentication, it lacks integrity validation, it uses a block cipher mode that is not really used nowadays, it is vulnerable to few attacks. So it is fine if you learn how CO2 did the crypto, but don't use it as a reference for future work :P
Now for learning, most sources have copy-pasted crypto. A few people have the full understanding, but I don't it was ever properly documented. Not that it is rocket science either. It is mostly self-documented by the code itself.
|
|
|
11/03/2021, 19:58
|
#3
|
elite*gold: 0
Join Date: Jun 2009
Posts: 611
Received Thanks: 195
|
Quote:
Originally Posted by CptSky
CO2 used symmetric key algorithms to encrypt packets. Historically, it was a custom-made stream cipher, nothing fancy. They later switched to block ciphers using the CFB64 mode (which converts the block cipher into a stream cipher, dumbed down). They used Blowfish and CAST-5. When they did that switch, they also introduced a "proper" key exchange using Diffie-Hellman, to generate the shared symmetric key. But the way it is implemented, it isn't protecting against MitM attacks.
CO2 also used RC5, a block cipher, to encrypt the password (as a single block basically). They later used I think SRP-6, but I've never looked at it.
You won't really see any uses of asymmetric key algorithms, digital signatures or even hash functions in CO2. The protocol lacks authentication, it lacks integrity validation, it uses a block cipher mode that is not really used nowadays, it is vulnerable to few attacks. So it is fine if you learn how CO2 did the crypto, but don't use it as a reference for future work :P
Now for learning, most sources have copy-pasted crypto. A few people have the full understanding, but I don't it was ever properly documented. Not that it is rocket science either. It is mostly self-documented by the code itself.
|
Thank you very much, this will help me a lot.
|
|
|
 |
Similar Threads
|
Cabal Privat Server New Ideas and new Concepts
08/16/2014 - Cabal Private Server - 6 Replies
Hey Guy´s .. Me and a Friend Looking for new Ideas and New Concepts for cabal privat server .. and now comes you guy´s if you have any NEW Idea or a new Concept ..pleas write it under this Topic ..We wanna create a new concept withe you guys.. ;) What you think about dropps and Rates and so on let us know ^^ WHAT YOU THINK MUST A PRIVAT SERVER HAVE TO PLAY HIM!!
-HowHigh- ;)
|
Clearing concepts
11/15/2013 - AutoIt - 23 Replies
Hello, epvp.
I'm new to programming,actually a bit new, I've programmed in only VB.Net on a very basic level. But I've done enough of it. I picked up AutoIt a while ago and it seemed a bit tempting. I tried to do whatever the tutorials said but they were all spoon feeding tutorials or C&P tutorials.
I just wanna know some things about some commands which are used and re-used in hacking.
_MemoryOpen($iv_Pid])
_MemoryRead($iv_Address, $ah_Handle)
_MemoryWrite($iv_Address, $ah_Handle,...
|
basic concepts
05/04/2013 - CO2 PServer Guides & Releases - 4 Replies
i don't really think if i should post this to define some basic concepts AS i think even after that people will still ask dumb questions but ill do it anyway
im so open minded , if you want to rephrase anything , add or remove sentences please commend with what you want to edit for better understanding for others
GM/PM commands : a gm/pm commands or commands in general are just a chat packet with special char (most common @) at the very first that process some data to the source to take...
|
[News] Neue APB Concepts
03/28/2012 - All Points Bulletin - 2 Replies
(auf spoiler klicken und thx nich vergessen ;))
http://www.abload.de/img/menu_loginscreen90kxh.jp g
http://www.abload.de/img/ui3wqk45.jpg
http://www.abload.de/img/map1cjjvc.jpg
http://www.abload.de/img/map2uakjr.jpg
http://www.abload.de/img/ui2v5kcm.jpg
http://www.abload.de/img/ui495jut.jpg
http://www.abload.de/img/ui5qrji0.jpg
|
All times are GMT +1. The time now is 19:27.
|
|