tag:blogger.com,1999:blog-10457042.post116862699228972073..comments2023-03-26T13:50:14.297+02:00Comments on Nicola's MAME Ramblings: How to bruteforce CPS2Nicolahttp://www.blogger.com/profile/08907289982537901905noreply@blogger.comBlogger4125tag:blogger.com,1999:blog-10457042.post-1168652669441963492007-01-13T02:44:00.000+01:002007-01-13T02:44:00.000+01:00You've been doing an incredible work! Keep up!see ...You've been doing an incredible work! Keep up!<BR/><BR/>see yap0nghttps://www.blogger.com/profile/02623098945914745155noreply@blogger.comtag:blogger.com,1999:blog-10457042.post-1168636347382516812007-01-12T22:12:00.000+01:002007-01-12T22:12:00.000+01:00OK. I suppose i could make some experiments to see...OK. I suppose i could make some experiments to see how far i can go with this... The attack works without considering whether or not the addresses are the same, but i'm not sure if it will finally need less data (BTW, how many triplets do you consider it should use to become "useful"? How many triplets will we have for the games without XOR files?).<BR/><BR/>Real life issues will get me away for the weekend, but i will try to resume the work next week. As a last note, the correlations between the 192 bits could have a positive impact, so i would like to see any conclusions you reach regarding that.Andreas Naivehttps://www.blogger.com/profile/02852453973867816281noreply@blogger.comtag:blogger.com,1999:blog-10457042.post-1168634705172117672007-01-12T21:45:00.000+01:002007-01-12T21:45:00.000+01:00For some games we might not have enough data to pe...For some games we might not have enough data to perform this attack. If you can devise an attack that needs less data, or that uses data from several addresses, that would surely help (also for games that we don't have a XOR for).Nicolahttps://www.blogger.com/profile/08907289982537901905noreply@blogger.comtag:blogger.com,1999:blog-10457042.post-1168631309940643782007-01-12T20:48:00.000+01:002007-01-12T20:48:00.000+01:00I was devising a linear cryptanalysis attack again...I was devising a linear cryptanalysis attack against the first bits of K1. Should i continue with it, or do you think the meet in the middle attack will work for all the games?Andreas Naivehttps://www.blogger.com/profile/02852453973867816281noreply@blogger.com