CAST IN THE NAME OF GOD. YE NOT GUILTY. ^ Apparently an RSA-OAEP constant in a version of Nintendo 3DS game card anti-piracy that was never used.
-
-
-
Replying to @endrift @Myriachan
One of the 128bit key scrambling functions used in the 3DS (IIRC) was ((X ^ Y) + "任天堂株式会社".encode("utf-16")) ROL 42 IIRC. Yes that's UTF-16LE with BOM. Added 128-bitwise.
3 replies 0 retweets 2 likes -
Or was that DSi, I forget.
2 replies 0 retweets 0 likes -
it was the dsi. the 3ds engine had the same dumb partial key overwrite bug though but I don't remember if the secret was similar as well
2 replies 0 retweets 1 like -
Yeah, the backward-compatible DSi key slots on the 3DS still had the partial overwrite. The 3DS-specific slots did not have this flaw, but had another that broke it. The RSA keyslots had their own partial key overwrite attack, but it wasn’t useful to compromise those keys.
1 reply 0 retweets 2 likes
I love how that bug has broken at least a half dozen, probably many more, embedded crypto implementations. *All* companies where the HW design team aren't security engineers, and where the security engineers aren't HW designers, screw that up.
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.