Hacking the Nintendo Alarmo

Liste des GroupesRevenir à s crypt 
Sujet : Hacking the Nintendo Alarmo
De : running_man (at) *nospam* writeable.com (The Running Man)
Groupes : sci.crypt
Date : 13. Nov 2024, 05:17:04
Autres entêtes
Organisation : EasyNews
Message-ID : <I6tBEO+2O6Yrl2POGgzf0VwQYUBmcvCvWybvlFo7WJM=@writeable.com>
<https://garyodernichts.blogspot.com/2024/10/looking-into-nintendo-alarmo.html>

I was somewhat surprised how easily they decrypted the encrypted firmware.

"The CRYP interface is configured for AES-128-CTR, which makes things easier.
Since, in CTR mode, a keystream is created, which is then combined with the plaintext to
encrypt and decrypt files, we can simply create a large amount of this keystream using
the CRYP interface, and then combine it with the encrypted files to decrypt them"

This shouldn't be possible since they keystream should never be reused.

Date Sujet#  Auteur
13 Nov 24 * Hacking the Nintendo Alarmo2The Running Man
13 Nov 24 `- Re: Hacking the Nintendo Alarmo1Rich

Haut de la page

Les messages affichés proviennent d'usenet.

NewsPortal