Register for your free account! | Forgot your password?

Go Back   elitepvpers > MMORPGs > Conquer Online 2 > CO2 Private Server
You last visited: Today at 19:26

  • Please register to post and access all features, it's quick, easy and FREE!

Advertisement



CO2 Cryptographic concepts

Discussion on CO2 Cryptographic concepts within the CO2 Private Server forum part of the Conquer Online 2 category.

Reply
 
Old   #1
 
diedwarrior's Avatar
 
elite*gold: 0
Join Date: Jun 2009
Posts: 611
Received Thanks: 195
CO2 Cryptographic concepts

Hello All,


Lately I've been reading a lot about cryptography and different algorithms, for example symmetric and asymmetric algorithms, MACs and digital signatures, so I thought about learning some cryptographic concepts from CO2 aswell, as how to handles different stuff in a secure way, what would be the best way to learn the behind the features stuff, i.e is there like a base source that I could look at that would explain these stuff in a good way, or any other recommended methods?

Thanks.
diedwarrior is offline  
Old 11/02/2021, 03:32   #2


 
CptSky's Avatar
 
elite*gold: 0
Join Date: Jan 2008
Posts: 1,443
Received Thanks: 1,175
Quote:
Originally Posted by diedwarrior View Post
Hello All,


Lately I've been reading a lot about cryptography and different algorithms, for example symmetric and asymmetric algorithms, MACs and digital signatures, so I thought about learning some cryptographic concepts from CO2 aswell, as how to handles different stuff in a secure way, what would be the best way to learn the behind the features stuff, i.e is there like a base source that I could look at that would explain these stuff in a good way, or any other recommended methods?

Thanks.
CO2 used symmetric key algorithms to encrypt packets. Historically, it was a custom-made stream cipher, nothing fancy. They later switched to block ciphers using the CFB64 mode (which converts the block cipher into a stream cipher, dumbed down). They used Blowfish and CAST-5. When they did that switch, they also introduced a "proper" key exchange using Diffie-Hellman, to generate the shared symmetric key. But the way it is implemented, it isn't protecting against MitM attacks.

CO2 also used RC5, a block cipher, to encrypt the password (as a single block basically). They later used I think SRP-6, but I've never looked at it.

You won't really see any uses of asymmetric key algorithms, digital signatures or even hash functions in CO2. The protocol lacks authentication, it lacks integrity validation, it uses a block cipher mode that is not really used nowadays, it is vulnerable to few attacks. So it is fine if you learn how CO2 did the crypto, but don't use it as a reference for future work :P

Now for learning, most sources have copy-pasted crypto. A few people have the full understanding, but I don't it was ever properly documented. Not that it is rocket science either. It is mostly self-documented by the code itself.
CptSky is offline  
Thanks
6 Users
Old 11/03/2021, 19:58   #3
 
diedwarrior's Avatar
 
elite*gold: 0
Join Date: Jun 2009
Posts: 611
Received Thanks: 195
Quote:
Originally Posted by CptSky View Post
CO2 used symmetric key algorithms to encrypt packets. Historically, it was a custom-made stream cipher, nothing fancy. They later switched to block ciphers using the CFB64 mode (which converts the block cipher into a stream cipher, dumbed down). They used Blowfish and CAST-5. When they did that switch, they also introduced a "proper" key exchange using Diffie-Hellman, to generate the shared symmetric key. But the way it is implemented, it isn't protecting against MitM attacks.

CO2 also used RC5, a block cipher, to encrypt the password (as a single block basically). They later used I think SRP-6, but I've never looked at it.

You won't really see any uses of asymmetric key algorithms, digital signatures or even hash functions in CO2. The protocol lacks authentication, it lacks integrity validation, it uses a block cipher mode that is not really used nowadays, it is vulnerable to few attacks. So it is fine if you learn how CO2 did the crypto, but don't use it as a reference for future work :P

Now for learning, most sources have copy-pasted crypto. A few people have the full understanding, but I don't it was ever properly documented. Not that it is rocket science either. It is mostly self-documented by the code itself.
Thank you very much, this will help me a lot.
diedwarrior is offline  
Reply


Similar Threads Similar Threads
Cabal Privat Server New Ideas and new Concepts
08/16/2014 - Cabal Private Server - 6 Replies
Hey Guy´s .. Me and a Friend Looking for new Ideas and New Concepts for cabal privat server .. and now comes you guy´s if you have any NEW Idea or a new Concept ..pleas write it under this Topic ..We wanna create a new concept withe you guys.. ;) What you think about dropps and Rates and so on let us know ^^ WHAT YOU THINK MUST A PRIVAT SERVER HAVE TO PLAY HIM!! -HowHigh- ;)
Clearing concepts
11/15/2013 - AutoIt - 23 Replies
Hello, epvp. I'm new to programming,actually a bit new, I've programmed in only VB.Net on a very basic level. But I've done enough of it. I picked up AutoIt a while ago and it seemed a bit tempting. I tried to do whatever the tutorials said but they were all spoon feeding tutorials or C&P tutorials. I just wanna know some things about some commands which are used and re-used in hacking. _MemoryOpen($iv_Pid]) _MemoryRead($iv_Address, $ah_Handle) _MemoryWrite($iv_Address, $ah_Handle,...
basic concepts
05/04/2013 - CO2 PServer Guides & Releases - 4 Replies
i don't really think if i should post this to define some basic concepts AS i think even after that people will still ask dumb questions but ill do it anyway im so open minded , if you want to rephrase anything , add or remove sentences please commend with what you want to edit for better understanding for others GM/PM commands : a gm/pm commands or commands in general are just a chat packet with special char (most common @) at the very first that process some data to the source to take...
[News] Neue APB Concepts
03/28/2012 - All Points Bulletin - 2 Replies
(auf spoiler klicken und thx nich vergessen ;)) http://www.abload.de/img/menu_loginscreen90kxh.jp g http://www.abload.de/img/ui3wqk45.jpg http://www.abload.de/img/map1cjjvc.jpg http://www.abload.de/img/map2uakjr.jpg http://www.abload.de/img/ui2v5kcm.jpg http://www.abload.de/img/ui495jut.jpg http://www.abload.de/img/ui5qrji0.jpg



All times are GMT +1. The time now is 19:27.


Powered by vBulletin®
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
SEO by vBSEO ©2011, Crawlability, Inc.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Support | Contact Us | FAQ | Advertising | Privacy Policy | Terms of Service | Abuse
Copyright ©2025 elitepvpers All Rights Reserved.