Re: Hacking the Nintendo Alarmo

Liste des GroupesRevenir à s crypt 
Sujet : Re: Hacking the Nintendo Alarmo
De : rich (at) *nospam* example.invalid (Rich)
Groupes : sci.crypt
Date : 13. Nov 2024, 16:10:42
Autres entêtes
Organisation : A noiseless patient Spider
Message-ID : <vh2fhi$28m7g$1@dont-email.me>
References : 1
User-Agent : tin/2.6.1-20211226 ("Convalmore") (Linux/5.15.139 (x86_64))
The Running Man <running_man@writeable.com> wrote:
<https://garyodernichts.blogspot.com/2024/10/looking-into-nintendo-alarmo.html>
 
I was somewhat surprised how easily they decrypted the encrypted
firmware.
 
"The CRYP interface is configured for AES-128-CTR, which makes things
easier.  Since, in CTR mode, a keystream is created, which is then
combined with the plaintext to encrypt and decrypt files, we can
simply create a large amount of this keystream using the CRYP
interface, and then combine it with the encrypted files to decrypt
them"
 
This shouldn't be possible since they keystream should never be
reused.

Yes, but this is also why the usual comment re. broken crypto goes
something like:

  "The cryptographic primitives are secure, it is the
   use/implementation of those into a larger system that is broken".

AES-128 is secure.

AES-128-CTR is also secure, **if used correctly**.

This is yet one more in a long line of examples of "not used correctly".

Date Sujet#  Auteur
13 Nov 24 * Hacking the Nintendo Alarmo2The Running Man
13 Nov 24 `- Re: Hacking the Nintendo Alarmo1Rich

Haut de la page

Les messages affichés proviennent d'usenet.

NewsPortal