Changes

Jump to navigation Jump to search
94 bytes added ,  19:07, 29 December 2015
Line 628: Line 628:  
The algorithm for generating the normal-key from keyX and keyY is as follows, in big-endian 128-bit unsigned wraparound arithmetic:
 
The algorithm for generating the normal-key from keyX and keyY is as follows, in big-endian 128-bit unsigned wraparound arithmetic:
   −
NormalKey = (((KeyX ROL 2) XOR KeyY) + C) ROL 87
+
NormalKey = (((KeyX ROL 2) XOR KeyY) + C) ROL 87. "ROL 87" is equivalent to "ROR 41", the latter is closer to the DSi algorithm which used 42.
    
The secret constant C has not been publicly disclosed.
 
The secret constant C has not been publicly disclosed.

Navigation menu