Changes

73 bytes added ,  23:40, 17 March 2015
Attempt #2
Line 27: Line 27:  
|-
 
|-
 
| TWL keyscrambler
 
| TWL keyscrambler
| The AESKEY0-3 registers are readable. This allows inspection of the normal-key when writing arbitrary keyX/keyY pairs. From there it is trivial to deduce the keyscrambler function. This attack does not work for the 3DS keyscrambler because keyslots 0-3 are only for TWL keys.
+
| After using the key generator to generate the normal-key, you could overwrite parts of the normal-key with your own data and then bruteforce the remaining keyscrambler output. From the normal-key outputs, you could deduce the TWL keyscrambler function.
 +
 
 +
This attack does not work for the 3DS keyscrambler because keyslots 0-3 are only for TWL keys.
 
| ?
 
| ?
 
| [[User:Yellows8|Yellows8]]
 
| [[User:Yellows8|Yellows8]]