<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.theiphonewiki.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Zuezuo</id>
	<title>The iPhone Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://www.theiphonewiki.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Zuezuo"/>
	<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/wiki/Special:Contributions/Zuezuo"/>
	<updated>2026-04-29T22:07:12Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.31.14</generator>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:NCK_Brute_Force&amp;diff=5876</id>
		<title>Talk:NCK Brute Force</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:NCK_Brute_Force&amp;diff=5876"/>
		<updated>2010-03-09T10:32:23Z</updated>

		<summary type="html">&lt;p&gt;Zuezuo: /* RSA attack */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Is this method usable to permanently unlock the iPhone (like IPSF) aka upgrade resistant and not needing a software like signal.app (and being able to use SIM PIN Code)?&lt;br /&gt;
This would allowed to have the &amp;quot;official&amp;quot; unlock (except activation)?&lt;br /&gt;
&lt;br /&gt;
== Time? ==&lt;br /&gt;
&lt;br /&gt;
How long would it take to search the 15 digit one?&lt;br /&gt;
&lt;br /&gt;
Geohots NCKBF program could do around 100,000 keys/second which would produce a hit in many years. &lt;br /&gt;
&lt;br /&gt;
To get to a point where this is actually doable we would need many orders of magnitude of improvement. Even if you use a PSP3 or special hardware (within 1,000 US$ range) you will only get an improvement of 20-100 times.. which doesn't help much. - Deco&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Using a system like BOINC ( known for seti @ home) would not help to distribute the load ?&lt;br /&gt;
&lt;br /&gt;
If Apple sold 10 Million devices, and lets say maybe 10k to 100k people participated, &lt;br /&gt;
we should be able to reduce that time from, lets say 200 years to a maximum of 2 weeks to 2 months.&lt;br /&gt;
&lt;br /&gt;
Now we would just need someone to create a modified client, manage the calculated packages and provide the packages which would need to be calculated/crunched.&lt;br /&gt;
&lt;br /&gt;
Just an idea.&lt;br /&gt;
&lt;br /&gt;
Chris&lt;br /&gt;
&lt;br /&gt;
And you'll end up with exactly ''one'' unlocked iPhone. Better off selling the machine hours. ~geohot&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Is it not possible to brute force the key that apple uses and then use that to unlock all iPhones?&lt;br /&gt;
&lt;br /&gt;
if we get say 1 million computers then how long would it theoretically take to generate one key? 1 million isn't that impossible given that 3 million iPhone 3Gs have been sold of most geeks have more than one computer. Assuming that on average everyone contributes 2 computers then we only need 500000 people to reach 1 million. subtract the speed of networking and the fact that some people will turn their computers off every so often and we should be able to generate 5 or 6 keys a day? this is kinda pathetic for just a proof of concept but just proving that we can generate code and can harness this much power would be a massive psychological blow to apple. also i would assume that we would need some main server to control all the computers which probably doesn't exist :P&lt;br /&gt;
&lt;br /&gt;
blog.iphone-dev.org had 276,688 unique visitors on July 20th (PwnageTool release 2.0/2.0.1), so I would assume that number is the sort of participants we would get. I think 2 computers from each person is also optimistic, it would probably be less than 1 on average as most people won't run it 24/7.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Mirror ==&lt;br /&gt;
Does anyone have a mirror for the Multithreaded NCK Brute Forcer I think the link is down.--[[User:Bob|Bob]] 14:49, 22 August 2008 (UTC)&lt;br /&gt;
&lt;br /&gt;
Reply: done --[[User:Zuezuo|Zuezuo]] 10:32, 9 March 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
== RSA attack ==&lt;br /&gt;
&lt;br /&gt;
Some researches recently published this paper:&lt;br /&gt;
&amp;quot;Fault-Based Attack of RSA Authentication&amp;quot; - http://www.eecs.umich.edu/~valeria/research/publications/DATE10RSA.pdf&lt;br /&gt;
&lt;br /&gt;
Could that be useful in this NCK attack?&lt;br /&gt;
--[[User:Zuezuo|Zuezuo]] 10:32, 9 March 2010 (UTC)&lt;/div&gt;</summary>
		<author><name>Zuezuo</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:NCK_Brute_Force&amp;diff=5875</id>
		<title>Talk:NCK Brute Force</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:NCK_Brute_Force&amp;diff=5875"/>
		<updated>2010-03-09T10:32:08Z</updated>

		<summary type="html">&lt;p&gt;Zuezuo: /* Mirror */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Is this method usable to permanently unlock the iPhone (like IPSF) aka upgrade resistant and not needing a software like signal.app (and being able to use SIM PIN Code)?&lt;br /&gt;
This would allowed to have the &amp;quot;official&amp;quot; unlock (except activation)?&lt;br /&gt;
&lt;br /&gt;
== Time? ==&lt;br /&gt;
&lt;br /&gt;
How long would it take to search the 15 digit one?&lt;br /&gt;
&lt;br /&gt;
Geohots NCKBF program could do around 100,000 keys/second which would produce a hit in many years. &lt;br /&gt;
&lt;br /&gt;
To get to a point where this is actually doable we would need many orders of magnitude of improvement. Even if you use a PSP3 or special hardware (within 1,000 US$ range) you will only get an improvement of 20-100 times.. which doesn't help much. - Deco&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Using a system like BOINC ( known for seti @ home) would not help to distribute the load ?&lt;br /&gt;
&lt;br /&gt;
If Apple sold 10 Million devices, and lets say maybe 10k to 100k people participated, &lt;br /&gt;
we should be able to reduce that time from, lets say 200 years to a maximum of 2 weeks to 2 months.&lt;br /&gt;
&lt;br /&gt;
Now we would just need someone to create a modified client, manage the calculated packages and provide the packages which would need to be calculated/crunched.&lt;br /&gt;
&lt;br /&gt;
Just an idea.&lt;br /&gt;
&lt;br /&gt;
Chris&lt;br /&gt;
&lt;br /&gt;
And you'll end up with exactly ''one'' unlocked iPhone. Better off selling the machine hours. ~geohot&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Is it not possible to brute force the key that apple uses and then use that to unlock all iPhones?&lt;br /&gt;
&lt;br /&gt;
if we get say 1 million computers then how long would it theoretically take to generate one key? 1 million isn't that impossible given that 3 million iPhone 3Gs have been sold of most geeks have more than one computer. Assuming that on average everyone contributes 2 computers then we only need 500000 people to reach 1 million. subtract the speed of networking and the fact that some people will turn their computers off every so often and we should be able to generate 5 or 6 keys a day? this is kinda pathetic for just a proof of concept but just proving that we can generate code and can harness this much power would be a massive psychological blow to apple. also i would assume that we would need some main server to control all the computers which probably doesn't exist :P&lt;br /&gt;
&lt;br /&gt;
blog.iphone-dev.org had 276,688 unique visitors on July 20th (PwnageTool release 2.0/2.0.1), so I would assume that number is the sort of participants we would get. I think 2 computers from each person is also optimistic, it would probably be less than 1 on average as most people won't run it 24/7.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Mirror ==&lt;br /&gt;
Does anyone have a mirror for the Multithreaded NCK Brute Forcer I think the link is down.--[[User:Bob|Bob]] 14:49, 22 August 2008 (UTC)&lt;br /&gt;
&lt;br /&gt;
Reply: done --[[User:Zuezuo|Zuezuo]] 10:32, 9 March 2010 (UTC)&lt;br /&gt;
&lt;br /&gt;
== RSA attack ==&lt;br /&gt;
&lt;br /&gt;
Some researches recently published this paper:&lt;br /&gt;
&amp;quot;Fault-Based Attack of RSA Authentication&amp;quot; - http://www.eecs.umich.edu/~valeria/research/publications/DATE10RSA.pdf&lt;br /&gt;
&lt;br /&gt;
Could that be useful in this NCK attack?&lt;/div&gt;</summary>
		<author><name>Zuezuo</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:NCK_Brute_Force&amp;diff=5874</id>
		<title>Talk:NCK Brute Force</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:NCK_Brute_Force&amp;diff=5874"/>
		<updated>2010-03-09T10:31:50Z</updated>

		<summary type="html">&lt;p&gt;Zuezuo: /* Mirror */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Is this method usable to permanently unlock the iPhone (like IPSF) aka upgrade resistant and not needing a software like signal.app (and being able to use SIM PIN Code)?&lt;br /&gt;
This would allowed to have the &amp;quot;official&amp;quot; unlock (except activation)?&lt;br /&gt;
&lt;br /&gt;
== Time? ==&lt;br /&gt;
&lt;br /&gt;
How long would it take to search the 15 digit one?&lt;br /&gt;
&lt;br /&gt;
Geohots NCKBF program could do around 100,000 keys/second which would produce a hit in many years. &lt;br /&gt;
&lt;br /&gt;
To get to a point where this is actually doable we would need many orders of magnitude of improvement. Even if you use a PSP3 or special hardware (within 1,000 US$ range) you will only get an improvement of 20-100 times.. which doesn't help much. - Deco&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Using a system like BOINC ( known for seti @ home) would not help to distribute the load ?&lt;br /&gt;
&lt;br /&gt;
If Apple sold 10 Million devices, and lets say maybe 10k to 100k people participated, &lt;br /&gt;
we should be able to reduce that time from, lets say 200 years to a maximum of 2 weeks to 2 months.&lt;br /&gt;
&lt;br /&gt;
Now we would just need someone to create a modified client, manage the calculated packages and provide the packages which would need to be calculated/crunched.&lt;br /&gt;
&lt;br /&gt;
Just an idea.&lt;br /&gt;
&lt;br /&gt;
Chris&lt;br /&gt;
&lt;br /&gt;
And you'll end up with exactly ''one'' unlocked iPhone. Better off selling the machine hours. ~geohot&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Is it not possible to brute force the key that apple uses and then use that to unlock all iPhones?&lt;br /&gt;
&lt;br /&gt;
if we get say 1 million computers then how long would it theoretically take to generate one key? 1 million isn't that impossible given that 3 million iPhone 3Gs have been sold of most geeks have more than one computer. Assuming that on average everyone contributes 2 computers then we only need 500000 people to reach 1 million. subtract the speed of networking and the fact that some people will turn their computers off every so often and we should be able to generate 5 or 6 keys a day? this is kinda pathetic for just a proof of concept but just proving that we can generate code and can harness this much power would be a massive psychological blow to apple. also i would assume that we would need some main server to control all the computers which probably doesn't exist :P&lt;br /&gt;
&lt;br /&gt;
blog.iphone-dev.org had 276,688 unique visitors on July 20th (PwnageTool release 2.0/2.0.1), so I would assume that number is the sort of participants we would get. I think 2 computers from each person is also optimistic, it would probably be less than 1 on average as most people won't run it 24/7.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Mirror ==&lt;br /&gt;
Does anyone have a mirror for the Multithreaded NCK Brute Forcer I think the link is down.--[[User:Bob|Bob]] 14:49, 22 August 2008 (UTC)&lt;br /&gt;
&lt;br /&gt;
Reply: done&lt;br /&gt;
&lt;br /&gt;
== RSA attack ==&lt;br /&gt;
&lt;br /&gt;
Some researches recently published this paper:&lt;br /&gt;
&amp;quot;Fault-Based Attack of RSA Authentication&amp;quot; - http://www.eecs.umich.edu/~valeria/research/publications/DATE10RSA.pdf&lt;br /&gt;
&lt;br /&gt;
Could that be useful in this NCK attack?&lt;/div&gt;</summary>
		<author><name>Zuezuo</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=Talk:NCK_Brute_Force&amp;diff=5873</id>
		<title>Talk:NCK Brute Force</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=Talk:NCK_Brute_Force&amp;diff=5873"/>
		<updated>2010-03-09T10:30:25Z</updated>

		<summary type="html">&lt;p&gt;Zuezuo: /* RSA attack */ new section&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Is this method usable to permanently unlock the iPhone (like IPSF) aka upgrade resistant and not needing a software like signal.app (and being able to use SIM PIN Code)?&lt;br /&gt;
This would allowed to have the &amp;quot;official&amp;quot; unlock (except activation)?&lt;br /&gt;
&lt;br /&gt;
== Time? ==&lt;br /&gt;
&lt;br /&gt;
How long would it take to search the 15 digit one?&lt;br /&gt;
&lt;br /&gt;
Geohots NCKBF program could do around 100,000 keys/second which would produce a hit in many years. &lt;br /&gt;
&lt;br /&gt;
To get to a point where this is actually doable we would need many orders of magnitude of improvement. Even if you use a PSP3 or special hardware (within 1,000 US$ range) you will only get an improvement of 20-100 times.. which doesn't help much. - Deco&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Using a system like BOINC ( known for seti @ home) would not help to distribute the load ?&lt;br /&gt;
&lt;br /&gt;
If Apple sold 10 Million devices, and lets say maybe 10k to 100k people participated, &lt;br /&gt;
we should be able to reduce that time from, lets say 200 years to a maximum of 2 weeks to 2 months.&lt;br /&gt;
&lt;br /&gt;
Now we would just need someone to create a modified client, manage the calculated packages and provide the packages which would need to be calculated/crunched.&lt;br /&gt;
&lt;br /&gt;
Just an idea.&lt;br /&gt;
&lt;br /&gt;
Chris&lt;br /&gt;
&lt;br /&gt;
And you'll end up with exactly ''one'' unlocked iPhone. Better off selling the machine hours. ~geohot&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Is it not possible to brute force the key that apple uses and then use that to unlock all iPhones?&lt;br /&gt;
&lt;br /&gt;
if we get say 1 million computers then how long would it theoretically take to generate one key? 1 million isn't that impossible given that 3 million iPhone 3Gs have been sold of most geeks have more than one computer. Assuming that on average everyone contributes 2 computers then we only need 500000 people to reach 1 million. subtract the speed of networking and the fact that some people will turn their computers off every so often and we should be able to generate 5 or 6 keys a day? this is kinda pathetic for just a proof of concept but just proving that we can generate code and can harness this much power would be a massive psychological blow to apple. also i would assume that we would need some main server to control all the computers which probably doesn't exist :P&lt;br /&gt;
&lt;br /&gt;
blog.iphone-dev.org had 276,688 unique visitors on July 20th (PwnageTool release 2.0/2.0.1), so I would assume that number is the sort of participants we would get. I think 2 computers from each person is also optimistic, it would probably be less than 1 on average as most people won't run it 24/7.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Mirror ==&lt;br /&gt;
Does anyone have a mirror for the Multithreaded NCK Brute Forcer I think the link is down.--[[User:Bob|Bob]] 14:49, 22 August 2008 (UTC)&lt;br /&gt;
&lt;br /&gt;
== RSA attack ==&lt;br /&gt;
&lt;br /&gt;
Some researches recently published this paper:&lt;br /&gt;
&amp;quot;Fault-Based Attack of RSA Authentication&amp;quot; - http://www.eecs.umich.edu/~valeria/research/publications/DATE10RSA.pdf&lt;br /&gt;
&lt;br /&gt;
Could that be useful in this NCK attack?&lt;/div&gt;</summary>
		<author><name>Zuezuo</name></author>
		
	</entry>
	<entry>
		<id>https://www.theiphonewiki.com/w/index.php?title=NCK_Brute_Force&amp;diff=5872</id>
		<title>NCK Brute Force</title>
		<link rel="alternate" type="text/html" href="https://www.theiphonewiki.com/w/index.php?title=NCK_Brute_Force&amp;diff=5872"/>
		<updated>2010-03-09T10:28:06Z</updated>

		<summary type="html">&lt;p&gt;Zuezuo: i've updated link to the nck brute forcer because previous one was dead&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a theoretical exploit which involves brute forcing the NCK from the [[seczone]] the CHIPID and the NORID. So far no one has made public an instance of NCK discovery using this theortical approach.&lt;br /&gt;
&lt;br /&gt;
==Credit==&lt;br /&gt;
gray, geohot&lt;br /&gt;
&lt;br /&gt;
==Feasibility==&lt;br /&gt;
Given that [[NCK]]s are 15 digits long, the keyspace is log(10^15)/log(2)~=2^50  This would be searchable if all the cryptography used was symmetric. But the algo is TEA(RSA(token), NCK+CHIPID+NORID) [[http://en.wikipedia.org/wiki/Tiny_Encryption_Algorithm TEA]]. So that inside [http://en.wikipedia.org/wiki/RSA RSA] has to be done. A modern machine can search the 8 digit keyspace in about 5 minutes, which means we need a couple orders of magnitude speed increase to consider 15 digit.&lt;br /&gt;
&lt;br /&gt;
==Implementation==&lt;br /&gt;
[http://www.filedropper.com/nckbf Multithreaded NCK Brute Forcer]&lt;br /&gt;
&lt;br /&gt;
[[Category:Baseband]]&lt;br /&gt;
[[Category:Unlocking Methods]]&lt;/div&gt;</summary>
		<author><name>Zuezuo</name></author>
		
	</entry>
</feed>