Private key

From PhatHack Wiki
Jump to navigation Jump to search

Generally speaking, the PhatBox uses 1024-bit RSA keys for authentication.

There are 100 private keys located in the "hidden" part of the hard drive (before the first partition starts). These are of unknown purpose.

There is a private key stored in plsign. PhatNoise intended for it to be used to sign playlists; Apparently, any code on the PhatBox that checks signatures, except the code in the bootloader, will accept this signature in lieu of a signature using the "proper" key.

Here is the private key used in plsign:

private_key     dw 1024                 ; bits
modulus:
 dd 9DFB37EDh, 0A63EE719h, 0A2AE1DF1h, 6D0F3A15h, 0B4B7DA89h
 dd 8A3DD295h, 9237DBD3h, 253233EDh, 0DCEA30F3h, 0B348B4E7h
 dd 6C2AF8AAh, 5D1BD540h, 740871FBh, 1345FE1Eh, 26BC2DF8h
 dd 0E1E0431h, 0DB04AC58h, 8D897BDh, 0F6030E7Ah, 0FE7860DFh
 dd 95C82202h, 67F89DBBh, 5F6B44DBh, 15B25853h, 0AACB5CCDh
 dd 0D95AA1D4h, 0D11ECAEDh, 1F6BE7E3h, 54FC0C8Eh, 69137B0h
 dd 0CC814D01h, 0AB14CC7Fh
publicExponent:
 dd 1Fh dup(0), 1000100h
exponent:
 dd 0D4B2A1Bh, 0AC46971Dh, 0B6317675h, 24DFF96Bh, 0E1F9216Bh
 dd 439D3A9Bh, 0FE47A995h, 84E75CF2h, 0B3A0A43h, 2DA0191Ch
 dd 4A7A09BBh, 38724E35h, 0B980FFDBh, 0BF488753h, 19DFAED5h
 dd 2BFD88FCh, 56CCF7ECh, 6AF8C730h, 15E64D53h, 0CDFD12FEh
 dd 8CD28F29h, 3B421BF6h, 0B697FF6Fh, 94050872h, 7D667EFEh
 dd 49626F8Eh, 323E1124h, 24E03BA4h, 0B5BAD260h, 0A85E88A7h
 dd 9EDA2CD0h, 41AD467Ch 
prime1:
 dd 0E7EF34F9h, 0AFB68403h, 902D429Dh, 8744C4F7h, 0BBAC0736h
 dd 7C71881Dh, 0C13682D9h, 32F9A8CFh, 7828FC3Ah, 0F3617D98h
 dd 0B9927AE1h, 2425548Bh, 8BD8F0EAh, 65B70768h, 9251E065h
 dd 4B3B8EDFh            
prime2:
 dd 5763AFF3h, 81807BADh, 4F99F66Dh, 4681B048h, 0A4EDE89Eh
 dd 6C7F0A39h, 30B4108Dh, 0B86F3307h, 5242BC9Fh, 5477E1D8h
 dd 7F512125h, 50AE303Eh, 8F4D1B90h, 7B5E4803h, 32A02F5Dh
 dd 21506DD7h            
primeExponent1:
 dd 50724146h, 0CF2B61C2h, 96059A9Eh, 0FE330395h, 75D7709Ah
 dd 5CFA0179h, 825D45A4h, 0ECA8348Eh, 6CC24C4Ch, 0E85B311Dh
 dd 0E8286D11h, 0BD5E2B3Eh, 9DB8AE65h, 4D589AB4h, 0B8E7C6B1h
 dd 0B900666Ch           
primeExponent2:
 dd 0CE5DCFCAh, 9FCE03CBh, 323F5E9h, 2BFD6B69h, 0D2E275D9h
 dd 0C6B1E69Ah, 96206196h, 0C3266818h, 442DAE71h, 4405CE6h
 dd 0C1D22238h, 2240F123h, 6F0CCDACh, 0E6A03BCAh, 0EC8757EBh
 dd 1A27EC8h             
coefficient:
 dd 660D1F02h, 9046BDF3h, 5D960162h, 2B467C1Ch, 0A991C2D6h
 dd 0D1DC86CDh, 14E2709Ch, 0AE825CBCh, 641C0E71h, 5C7005C9h
 dd 8782C8F6h, 39A6CDBBh, 0CD9E149Ch, 3D6892B5h, 2C721F50h
 dd 7DC9EBC8h            
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----