Search found 104 matches
- Thu Dec 06, 2007 4:00 am
- Forum: NES Hardware and Flash Equipment
- Topic: Reverse engineering help - Reward$$
- Replies: 89
- Views: 30769
- Mon Dec 03, 2007 12:34 pm
- Forum: NES Hardware and Flash Equipment
- Topic: Reverse engineering help - Reward$$
- Replies: 89
- Views: 30769
Cita: I don't have much knowledge of block ciphers to back this up, but my intuition leads me to ask: Is this an unbalanced Feistel block cipher which breaks the input into 4 bytes? There is no way i can answer that question without knowing the algorithm, but i don't consider that tests as a solid ...
- Mon Dec 03, 2007 7:47 am
- Forum: NES Hardware and Flash Equipment
- Topic: Reverse engineering help - Reward$$
- Replies: 89
- Views: 30769
If there is a map taking any N bit input to another N bit output, and the mapping is one-to-one and therefore invertable, then if we construct the table (as above) for this, then the property that all the values in a collumn must be either all odd or all even can be said for the rows as well. This ...
- Sun Dec 02, 2007 2:01 am
- Forum: NES Hardware and Flash Equipment
- Topic: Reverse engineering help - Reward$$
- Replies: 89
- Views: 30769
- Sat Dec 01, 2007 3:08 pm
- Forum: NES Hardware and Flash Equipment
- Topic: Reverse engineering help - Reward$$
- Replies: 89
- Views: 30769
Yeah, I already started with the old list. I might as well let that finish, and rerun with the new list next if you want. Not still; firstly send me the file you are doing; i will decide based on what i see in that. I'm not sure what this table is representing. Can you describe it a bit more? Of co...
- Sat Dec 01, 2007 5:01 am
- Forum: NES Hardware and Flash Equipment
- Topic: Reverse engineering help - Reward$$
- Replies: 89
- Views: 30769
Ok, I have repeated the test with the 4dc ID. the result would be this: input bits: 0 4 5 6 7 9 a c d e f 16 17 1a 1b 1d output bits: 0 2 4 6 8 9 f 12 13 14 15 16 18 1a 1e 1f and, when mixing both, this: input bits: 0 2 4 5 6 7 e f 14 15 16 17 1a 1b 1d 1e output bits: 0 1 2 4 6 8 9 c f 12 13 14 18 1...
- Sat Dec 01, 2007 4:16 am
- Forum: NES Hardware and Flash Equipment
- Topic: Reverse engineering help - Reward$$
- Replies: 89
- Views: 30769
For every challenge I've seen so far, the following ID's give the same output: ID004DC ID004DD ID0001C ID0001D The only other devices I own, fit in another group. These ID's give the same output: ID0007C ID0007D ID001EC ID001ED ID0006C ID0006D Well, maybe this could give some info about the key-sch...
- Fri Nov 30, 2007 2:31 pm
- Forum: NES Hardware and Flash Equipment
- Topic: Reverse engineering help - Reward$$
- Replies: 89
- Views: 30769
- Thu Nov 29, 2007 1:07 am
- Forum: NES Hardware and Flash Equipment
- Topic: Reverse engineering help - Reward$$
- Replies: 89
- Views: 30769
- Tue Nov 27, 2007 2:52 pm
- Forum: NES Hardware and Flash Equipment
- Topic: Reverse engineering help - Reward$$
- Replies: 89
- Views: 30769
- Tue Nov 27, 2007 4:46 am
- Forum: NES Hardware and Flash Equipment
- Topic: Reverse engineering help - Reward$$
- Replies: 89
- Views: 30769
Another commentary: Due to the fact that the big blocks of data we have are not homogeneusly spatiated within F2^32, i'm fearing some of the statistics could be distorted (it's almost impossible to say if this would be the case, but a priori it's possible). In that line, i would like to get a set of...
- Tue Nov 27, 2007 2:04 am
- Forum: NES Hardware and Flash Equipment
- Topic: Reverse engineering help - Reward$$
- Replies: 89
- Views: 30769
That's amazing, F doesn't even need to be invertible. What a neat structure. Yeah. Indeed, if F were invertible, the schema would become weaker. So then is the main difference between a Feistel network and a Substitution-permutation network, that the Feistel network uses non-invertible functions in...
- Mon Nov 26, 2007 12:55 pm
- Forum: NES Hardware and Flash Equipment
- Topic: Reverse engineering help - Reward$$
- Replies: 89
- Views: 30769
Yeah. After taking a first look at some statistics, it really seems a block cipher. I'm guessing it could be a multi-round scheme, most probably a SP network or a Feistel network with a relatively low number of rounds. If we got a full table, i could confirm o discard the second case; in our case, i...
- Mon Nov 26, 2007 2:15 am
- Forum: NES Hardware and Flash Equipment
- Topic: Reverse engineering help - Reward$$
- Replies: 89
- Views: 30769
Thanks for the heads-up, Lord Nightmare. Hi, neviksti; i'm glad to hear from you again. :) I'm interested on this; indeed, you are doing what i was desiring to do with *another* encryption device, so i feel motivated to this. ;) I have just read the thread, and i still have to take a look at the fil...