60w ago - Following up on the previous Blu-ray drive emulation rumor, today modrobert has announced that 3K3y, a PS3Key (ODD) - essentially an XKey for PS3 - is incoming shortly with some preliminary details outlined below.
Still can't get too excited at requiring additional hardware to play PS3 games with the advent of PlayStation 3 Custom Firmware a few years ago though.
To quote from EurAsia (linked above): I just got word from a well known team that will make PS3 owners happy!
Watching the video and drooling!! With those few words I hope to keep you interested...
Below is a picture (via facebook.com/x360key) as well.
More info while waiting for the video: In order to retrieve the needed BD drive key, Team 3k3y (aka xk3y) will release a PS3 software tool which requires CFW 3.55, after the key is dumped the PS3 can be upgraded to latest official system update (firmware/XMB) to get PSN etc.
The team is exploring other options to dump the required key as well, more on that later.
I'm relatively sure it does support original discs as well, but will confirm it anyway. Pretty much same functionality as xkey.
For now, any PS3 model that can be downgraded to CFW 3.55 will be supported, this is only to retrieve the Blu-ray drive key, after that you can update as you want.
The 3k3y Team is researching other options to dump the required key as well, more on that later. For now you have to downgrade to (or be on) CFW 3.55 in order to get the unique BD drive key required by 3k3y, once you have the key the PS3 can be updated anyway you want, doesn't matter for 3key.
General tech info about 3k3y which is true for xkey as well:
The 3k3y hardware device is an advanced Optical Disc Drive (ODD) emulator, it does not rely on any software based hacks to operate (once the drive key is known).
The device is connected on the SATA (PATA) bus in the PS3, like this; cable from PS3 goes into 3key, cable to BD drive goes out from 3k3y, in other words 3k3y physically sits between the drive and the PS3 mainboard and offers USB 2.0 port to connect hard drive(s). Games residing on the connected hard drive(s) can be selected using a small remote display with buttons (as seen in the photo linked a few posts up reading "PS3" in white characters on the display).
For the PS3 this device appears as a legit BD drive, and replies to any ATA protocol requests/commands the same way the original drive does. The BD drive key which is unique in each PS3 makes it possible for 3k3y to decrypt/encrypt data on the fly and redirect SATA traffic originally on disc media from the hard drive connected via USB 2.0 instead. No original Blu-ray disc needs to be inserted for operation, you can use this without any disc in the drive.
Again, this makes it possible to use any official firmware (XMB) version you want after installation (and key retrieval). No need for software hacks like CFW or DEX to make this work at all. If the original game requires firmware (XMB) 4.25, then go ahead and update, just like you would if the system was completely original (virgin).
I hope this clears up any misunderstandings what 3k3y does, or what it requires.
If the CFW you use can load games on Blu-Ray from the BD drive today, then it will be able to do that from hard drive with 3k3y installed as well.
However, to my knowledge the Blu-ray Disc (BD) drive is not used with CFW, original game disc can be mounted for compatibility, but games are actually loaded from a hard drive connected to the USB port on PS3 or from the internal hard drive.
Simply put, whatever fails with the installed CFW will fail with 3key as well. That's the reason it is kind of pointless to use 3k3y with CFW, but makes a lot of sense to use OFW.
The team for now is only releasing one picture regarding 3K3Y, but are hoping for an end of the year release.
It is full hardware interface, not a dongle, but currently you need CFW v3.55 to dump the BD drive key, after that you can update.
It will be complete ODD Blu-ray emulator, allowing even the feature to rip your original PS3 game discs to your external HDD.
Due to the nature of design, you will be required to open your PS3 to install it, but NO SOLDERING is needed.
More info will be release later, but for now any more pictures and videos are PRIVATE and been shown only to trusted long-time resellers.
In order to retrieve the needed BD drive key, Team 3k3y (aka xk3y) will release a PS3 util which requires CFW 3.55, after the key is dumped the PS3 can be upgraded to latest official system update (firmware/XMB) to get PSN etc. The team is exploring other options to dump the required key as well, more on that later.
Update: Below is a minor timeline update, as follows:
[21/10/12] 3k3y key dumper app! (pictured below)
Finally from bubba: You will need do some soldering with this ODE... If You want to get the keys from 4.31. SATA bus level For 25xx and newer models will need to be solder and to get the keys and play backups.
Stay tuned for more PS3 Hacks and PS3 CFW news, follow us on Twitter and be sure to drop by the PS3 Hacks and PS3 Custom Firmware Forums for the latest PlayStation 3 scene updates and homebrew releases!
I have now added the PS3 3K3y Keydumper v1.00 / v1.01 for PS3 3.55-4.31 CFW to the main article for those interested alongside a note from zecoxao as follows:
Download: http://www.mirrorcreator.com/files/2DGE45CY/3k3y-keydumper-v1.rar_links / http://www.mediafire.com/?4l27o19ockqlg6l by jarmster (Note: Leave a USB stick installed when you run the app, it puts a 1kb file called 3dump.bin on the stick containing the decrypted drive keys)
3k3y Ripp3r v1.01 Setup and User Guide: Windows software for ripping/decrypting/reencrypting PS3 disks. The user manual is included in the archive.
Fixed a bug that affected encryption/decryption of very large files.
From zecoxao: I bet people didn't even touch the implementation of http://dl.dropbox.com/u/35197530/libeeid.7z that naehrwert left us, and then these guys come, use flat_z's code to get the eid_root_key on hackables, and grab the necessary part of the code from libeeid to generate the eid4_key from it and decrypt the eid4. Bunch of freaking losers.
People, if you're that desperate to get the drive key (which is in eid4) just memdump eEID, get your eid_root_key with flatz's package and use my program which is adapted from naehrwert's code. you can even see for yourselves what's happening in the code. Don't forget to rename the eEID you get from your console's NOR/NAND to eid (without an extension) and place it on eid folder. same as key and iv (split them up with a hex editor).
You can then try that program and compare your decrypted eid4 with the pkg's dump, and realize it's the same crap.
Here we can see the keys used by the ripper (taken from: ps3devwiki.com/wiki/BD_Drive_Reverse_Engineering#Program and ps3devwiki.com/wiki/BD_Drive_Reverse_Engineering#Information_about_EID4):
The keys are in eid4, and yes, we DO need to decrypt it, or else Sony would be the biggest bunch of retards.. the eid4 key is used to verify the cmac hash of the first 0x20 bytes. Naehrwert's code seems to prove this:
omac1 basically spits out the digest of the secure communication channel keys. if you compare the digest with the last 16 bytes of eid4, it should match
Corrected some info. and apparently i was mistaken when i thought that 3Dump.bin contained the eid4 ENcrypted. it contains in fact eid4 DEcrypted. You still need to auth with the bd drive. that's the part Cobra/E3 figured out. we can do this normally with hacked consoles, but not with unhacked consoles.
So the ODE dumper package dumps the DEcrypted eid4, correct? now i understand. i was confused because i thought you said the eid4 ENcrypted was the same as 3Dump.bin.
From jarmster: The eid4 from running libeeid is a decrypted dump. The 3dump.bin is exactly the same. The eEID_Dumper.pkg dumps the encrypted eid4. And from the wiki: EID4 is of size 0x30 bytes: 0x0-0xf bytes = 1st key, 0x10-0x1f - 2nd key, 0x20-0x2f - CMAC-OMAC1 of EID4.
eid4 offset 303A0 - 303CF full nordump
first key = 0-f (key1?)
sec key = 20-2f omac hash(required just as cex2dex convert to calculate usin omac's)
now for 3dump.bin: (= encrypted eid4(0-2f)+eid_root_key(30-5f)
offset 0-1f = match original full nordump = offset 303a0-303bf (encrypted eid4)
offset 20-2f = sec key = match full nordump-encrypted eid4 = omac hash key
offset 30-5f = root_key per console key (also required to calculate+omac hash... real bdkey?
then we have zecoxao's program, it gives an erro on eid3 of missing stuff but it dumps also an "eid4d.bin"
offset 0-1f = decrypted eid4?! >>omac hash is match original nordump/encrypted eid4/3Dump.bin
should be different.. correct..?
From zadow28 on the 3K3y PKG file: pastebin.com/79V2KdTK
I'm not into VS very much, maybe the devs can have an look. It's the visual source/assembly code for the x3key ps3 software for pc. got there keys and even shows there iso disc codes, plus a lot more. I'm not an visual expert, so maybe there are some visual experts here. shows how the x3key acts like an Bulk. etc
The iso for x3key are crypted, so they only play with there tool.. the source for encrypting the iso are in there too.
From Abkarino (via Zadow28) comes the 3K3y Ripper (PC Software) hacked source code recovered, as follows:
This is a quick and dirty release for 3K3Y Ripper application including the full recovered source code. So you can build/modify your own version. All you will need is: .Net Framework Runtime v4.0
Message to 3K3Y Team: Do not steal glevand's work again Also do not forget to protect you applications using a good .Net protector like .Net Reactor to prevent me or any body else from recovering your codes. Hope that will help someone to do something useful in the future.
Abkarino (Mohammed Hassan)
Finally, from 3Key: 3k3y IRD files 2013-03-15 is a collection of IRD (Iso Rebuild Data) files for 3k3y. Use them to convert PSJB game dumps to full PS3 ISO.