Difference between revisions of "GID Key"

From The iPhone Wiki
Jump to: navigation, search
m (Fail.)
(some links to recent side-channel attack infos, removed stub because article is complete (can be expanded though))
Line 1: Line 1:
The '''GID-key''' is the AES key shared by all devices with the same application processor. (This key differs between devices with the [[S5L8900]]-based devices and [[S5L8930]]-based devices and higher)
+
The '''GID-key''' is the AES key shared by all devices with the same application processor. This key differs between devices with the [[S5L8900]]-based devices and [[S5L8930]]-based devices and higher.
   
 
It was used to generate [[AES Keys#Key 0x837|Key 0x837]].
 
It was used to generate [[AES Keys#Key 0x837|Key 0x837]].
   
 
== Attack ==
 
== Attack ==
It would be great to perform some sort of [[wikipedia:side channel attack|side channel attack]] on this to extract it.
+
It would be great to perform some sort of [[wikipedia:side channel attack|side channel attack]] on this to extract it:
   
  +
* [http://www.quovadislabs.com/ Quo Vadis Labs]
{{stub|hacking}}
 
  +
* [http://www.cl.cam.ac.uk/~sps32/ECRYPT2011_1.pdf Fault attacks on secure chips: from glitch to flash (Part 1)]
  +
* [http://www.cl.cam.ac.uk/~sps32/ECRYPT2011_2.pdf Side-channel attacks: new directions and horizons (Part 2)]
  +
* [http://www.cl.cam.ac.uk/~sps32/qvl_proj.html Research project: developing new technology for efficient side-channel analysis]
  +
  +
== See also ==
  +
* [[AES Keys]]

Revision as of 07:34, 28 May 2012

The GID-key is the AES key shared by all devices with the same application processor. This key differs between devices with the S5L8900-based devices and S5L8930-based devices and higher.

It was used to generate Key 0x837.

Attack

It would be great to perform some sort of side channel attack on this to extract it:

See also