Difference between revisions of "Flipbook XOR Pad"
Jump to navigation
Jump to search
Line 5: | Line 5: | ||
10: C7 9B C4 D8 DD 28 8A 87 53 20 EE E0 0B EB 43 A0 | 10: C7 9B C4 D8 DD 28 8A 87 53 20 EE E0 0B EB 43 A0 | ||
20: DB 55 0F 75 36 37 EB 35 6A 34 7F B5 0F 99 F7 EF | 20: DB 55 0F 75 36 37 EB 35 6A 34 7F B5 0F 99 F7 EF | ||
− | 30: 43 25 CE A0 29 46 D9 D4 4D BB 04 | + | 30: 43 25 CE A0 29 46 D9 D4 4D BB 04 66 68 08 F1 F8 |
Revision as of 00:22, 16 August 2009
Since the encryption used is AES-128-CTR, there's a static XOR pad (generated from the key) applied when encrypting/decrypting. It repeats each 0x40 (what a fuck-up, Nintendo). Here's the XOR pad used for the *.lst file (hexadecimal):
00: F7 4C 6A 3A FB 82 A6 37 6E 11 38 CF A0 DD 85 C0 10: C7 9B C4 D8 DD 28 8A 87 53 20 EE E0 0B EB 43 A0 20: DB 55 0F 75 36 37 EB 35 6A 34 7F B5 0F 99 F7 EF 30: 43 25 CE A0 29 46 D9 D4 4D BB 04 66 68 08 F1 F8