💾 Archived View for gemini.prevarikation.com › gemlog › 20220505-preimage-attack-on-the-knollan.gmi captured on 2022-06-11 at 21:19:23. Gemini links have been rewritten to link to archived content

View Raw

More Information

⬅️ Previous capture (2022-06-04)

-=-=-=-=-=-=-

2022-05-05: Pre-image attack on the Knollan

I've worked on (physically) toolless decoding methods to open a Master Lock Speed Dial with unknown combination, and yesterday Blank_Registration shared something fascinating. Apparently, using one of his cutaway locks, he can look at the wheel colorings visible through the cutouts and decode the lock using a specific algorithm, like a Rubik's Cube. (!)

In other words, a pre-image attack!

Blank_Registration is the first person I know of to publish a toolless decoding method (it uses keyspace reduction to knock possible combos down to <=75), so it's not surprising that he'd figure out another novel attack on this lock, but I'm impressed AF.

This technique opens the door to a *completely* unassisted attack on the lock, where the internal states are first decoded and then the pre-image attack constructs a dialling sequence to open the lock. I've been challenged to discover the pre-image technique myself using one of Blank_Reg's cutaways, and I'm hoping my skill is up to it.

Photos of Blank_Reg's cutaway lock

mh's Speed Dial/Knollan analysis

Lock Picking 101 Speed Dial discussion thread

Visualizer