AES Registers: Difference between revisions
→Hardware key generator: Added algorithm for hardware key generator |
|||
Line 628: | Line 628: | ||
The algorithm for generating the normal-key from keyX and keyY is as follows, in big-endian 128-bit unsigned wraparound arithmetic: | The algorithm for generating the normal-key from keyX and keyY is as follows, in big-endian 128-bit unsigned wraparound arithmetic: | ||
NormalKey = (((KeyX ROL 2) XOR KeyY) + C) ROL 87 | NormalKey = (((KeyX ROL 2) XOR KeyY) + C) ROL 87. "ROL 87" is equivalent to "ROR 41", the latter is closer to the DSi algorithm which used 42. | ||
The secret constant C has not been publicly disclosed. | The secret constant C has not been publicly disclosed. |