The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "GID Key"
(Decryption Category.) |
(Note about 3.0GM/3.0 pseudo GID Key.) |
||
Line 2: | Line 2: | ||
It was used to generate [[AES Keys#Key 0x837|Key 0x837]]. |
It was used to generate [[AES Keys#Key 0x837|Key 0x837]]. |
||
+ | |||
+ | In [[iOS]] 3.0GM/3.0, a pseudo GID Key was used. This allowed getting [[Firmware Keys|firmware decryption keys]] for these firmwares only without the device and with tools such as GitKeys or OpenSSL. |
||
== Attack == |
== Attack == |
Revision as of 10:52, 4 November 2013
The GID-key (device group ID key) is the AES 256-bit key shared by all devices with the same application processor. This key differs between each SoC. (i.e. The S5L8900 has a different key from the S5L8930.)
It was used to generate Key 0x837.
In iOS 3.0GM/3.0, a pseudo GID Key was used. This allowed getting firmware decryption keys for these firmwares only without the device and with tools such as GitKeys or OpenSSL.
Attack
It would be great to perform some sort of side channel attack on this to extract it:
- Quo Vadis Labs
- Fault attacks on secure chips: from glitch to flash (Part 1)
- Side-channel attacks: new directions and horizons (Part 2)
- Research project: developing new technology for efficient side-channel analysis