💾 Archived View for gemini.prevarikation.com › gemlog › 20220505-preimage-attack-on-the-knollan.gmi captured on 2022-06-11 at 21:19:23. Gemini links have been rewritten to link to archived content
⬅️ Previous capture (2022-06-04)
-=-=-=-=-=-=-
I've worked on (physically) toolless decoding methods to open a Master Lock Speed Dial with unknown combination, and yesterday Blank_Registration shared something fascinating. Apparently, using one of his cutaway locks, he can look at the wheel colorings visible through the cutouts and decode the lock using a specific algorithm, like a Rubik's Cube. (!)
In other words, a pre-image attack!
Blank_Registration is the first person I know of to publish a toolless decoding method (it uses keyspace reduction to knock possible combos down to <=75), so it's not surprising that he'd figure out another novel attack on this lock, but I'm impressed AF.
This technique opens the door to a *completely* unassisted attack on the lock, where the internal states are first decoded and then the pre-image attack constructs a dialling sequence to open the lock. I've been challenged to discover the pre-image technique myself using one of Blank_Reg's cutaways, and I'm hoping my skill is up to it.
Photos of Blank_Reg's cutaway lock
mh's Speed Dial/Knollan analysis