0 Members and 2 Guests are viewing this topic.
What would cracking the nSpire RSA codes do? Aren't they simply used for the Certificate?
Oh, so cracking the code would make custom OS patches viable?So all you would really need is the private key and the encrypted data, correct (it's been a little while since I've worked with RSA)?
Quote from: Qwerty.55 on October 09, 2010, 06:40:04 pmOh, so cracking the code would make custom OS patches viable?So all you would really need is the private key and the encrypted data, correct (it's been a little while since I've worked with RSA)?Yup. The private key will let us resign the modified OS, making any changes possible. PLUS - it would also let us create better OSes (hint: Linux calc distro!!), and install them too.
If all you need to find is the private key (I'm assuming someone's already located the encrypted data), why go to the trouble of number sieving? What you have is a situation any code cracker would dream of where you have access to the device itself. Instead of inefficiently using random numbers, use the bits in the memory itself as the random numbers. When you get a combination that works for the private key, then there's your answer. And since I'm fairly sure the nSpire's emulator can run 84+ ASM, just use an Assembly program to look at the bit level data in the memory. In fact, this is exactly what one of my current projects does.If you know the approximate location in the memory, then the situation gets even better as you can narrow your search.EDIT: Yep, you could probably get something like Tiny Core Linux to run on-calc.
I think I need to look at RSA again You're right.
First an 84 jb's a ps3, now (possibly) an NSpire. Nice. This is looking looking interesting.