Editing Kirk
Jump to navigation
Jump to search
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 837: | Line 837: | ||
- Commands 5 (encryption) and 8 (decryption) use a per-console key derived from the key mesh | - Commands 5 (encryption) and 8 (decryption) use a per-console key derived from the key mesh | ||
- Commands 6 (encryption) and 9 (decryption) use a key derived from | - Commands 6 (encryption) and 9 (decryption) use a key derived from the keyseed using an unknown key derivation function | ||
In all cases, data is prefixed with a 0x14-byte long header (except for commands 6 and 9 where it is longer). | In all cases, data is prefixed with a 0x14-byte long header (except for commands 6 and 9 where it is longer). |