frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Open in hackernews

A Copy-Paste Bug That Broke PSpice AES-256 Encryption

https://jtsylve.blog/post/2026/03/18/PSpice-Encryption-Weakness
26•jtsylve•3d ago

Comments

jtsylve•3d ago
I posted SpiceCrypt (https://github.com/jtsylve/spice-crypt) a few days ago for decrypting LTspice models. It now supports all six PSpice encryption modes as well.

PSpice is Cadence's SPICE simulator. Vendors encrypt component models with it, which locks them to PSpice and prevents use in NGSpice, Xyce, etc. Modes 0-3 and 5 derive keys entirely from constants in the binary, so those are straightforward once you extract them.

Mode 4 is the interesting one. It's the only mode with user-supplied key material and uses AES-256 in ECB mode. The key derivation has two base keys: a 4-byte short key (originally for DES) and a 27-byte extended key (intended for AES). The code passes only the short key to the AES engine -- it looks like a copy-paste from the DES path that was never corrected. The short key gets null-terminated and zero-padded to 32 bytes, so 28 of 32 AES key bytes are known. Effective keyspace is 2^32, brute-forceable in seconds with AES-NI.

The first encrypted block after every marker is a metadata header with a known plaintext prefix, which gives you a crib for validation. Once you recover the 4-byte short key, the full user key is also recoverable from the decrypted header.

This has likely been shipping since PSpice 16.6 in 2014. Fixing it would break every encrypted model created in the last twelve years.

The blog post linked above walks through the full details. The repo also has specifications documenting all the encryption schemes: https://github.com/jtsylve/spice-crypt/tree/v2.0.1/SPECIFICA...

Polizeiposaune•1h ago
The key sizing seems very odd - 4 bytes for DES? Even in the bad old days of 40-bit export crypto you'd get at least 5 bytes. For full-strength single-DES I'd expect either 7 or 8 bytes (56 bits of key used by the algorithm, but there's an quirk around key parity that means keys are commonly represented in 8 bytes).

And a 27-byte key for AES-256 is also slightly undersized. Far from catastrophic but, like brown M&M's in the green room of a Van Halen concert venue, it's a strong signal that something is off...

userbinator•42m ago
To me, it's a sign of crypto being used to tick off a box (and perhaps not arouse concerns around export), and not anything resembling a serious security system. "Locks are for keeping honest people honest," as the saying goes.
pseudohadamard•1d ago
TFA says it all in the first sentence describing the problem:

  The Bug

  Mode 4 uses AES-256 in ECB mode ...
ECB is the least secure encryption mode you can use, the one that's warned against in every beginner text. Seeing this is a bit like seeing "We vibe-coded our firewall in PHP...", it's pretty much a written guarantee that the rest of it will be a catalogue of wrong.

They did use AES-256 though, because using keys that go to 11 for your insecure encryption looks good in the marketing materials.

userbinator•44m ago
This "encryption" was arguably never for any security anyway, just obfuscation.

PC Gamer recommends RSS readers in a 37mb article that just keeps downloading

https://stuartbreckenridge.net/2026-03-19-pc-gamer-recommends-rss-readers-in-a-37mb-article/
483•JumpCrisscross•12h ago•242 comments

The gold standard of optimization: A look under the hood of RollerCoaster Tycoon

https://larstofus.com/2026/03/22/the-gold-standard-of-optimization-a-look-under-the-hood-of-rolle...
319•mariuz•11h ago•93 comments

Tin Can, a 'landline' for kids

https://www.businessinsider.com/tin-can-landline-kids-cellphone-cell-alternative-how-2025-9
73•tejohnso•2d ago•63 comments

The future of version control

https://bramcohen.com/p/manyana
486•c17r•15h ago•271 comments

Reports of code's death are greatly exaggerated

https://stevekrouse.com/precision
353•stevekrouse•19h ago•259 comments

Can you get root with only a cigarette lighter? (2024)

https://www.da.vidbuchanan.co.uk/blog/dram-emfi.html
14•HeliumHydride•2d ago•1 comments

Why I love NixOS

https://www.birkey.co/2026-03-22-why-i-love-nixos.html
271•birkey•13h ago•177 comments

Project Nomad – Knowledge That Never Goes Offline

https://www.projectnomad.us
409•jensgk•18h ago•136 comments

Flash-MoE: Running a 397B Parameter Model on a Laptop

https://github.com/danveloper/flash-moe
333•mft_•19h ago•112 comments

A Copy-Paste Bug That Broke PSpice AES-256 Encryption

https://jtsylve.blog/post/2026/03/18/PSpice-Encryption-Weakness
26•jtsylve•3d ago•5 comments

Windows native app development is a mess

https://domenic.me/windows-native-dev/
392•domenicd•20h ago•378 comments

GoGoGrandparent (YC S16) is hiring Back end Engineers

https://www.ycombinator.com/companies/gogograndparent/jobs/2vbzAw8-backend-engineer
1•davidchl•3h ago

MAUI Is Coming to Linux

https://avaloniaui.net/blog/maui-avalonia-preview-1
191•DeathArrow•14h ago•96 comments

GrapheneOS will remain usable by anyone without requiring personal information

https://grapheneos.social/@GrapheneOS/116261301913660830
334•nothrowaways•9h ago•90 comments

Intuitions for Tranformer Circuits

https://www.connorjdavis.com/p/intuitions-for-transformer-circuits
43•cjamsonhn•5h ago•3 comments

Migrating the American Express Payment Network, Twice

https://americanexpress.io/migrating-the-payments-network-twice/
63•madflojo•6h ago•16 comments

Five Years of Running a Systems Reading Group at Microsoft

https://armaansood.com/posts/systems-reading-group/
150•Foe•13h ago•43 comments

What Young Workers Are Doing to AI-Proof Themselves

https://www.wsj.com/economy/jobs/ai-jobs-young-people-careers-14282284
112•wallflower•12h ago•173 comments

They're Vibe-Coding Spam Now

https://tedium.co/2026/02/25/vibe-coded-email-spam/
70•raybb•8h ago•42 comments

The way CTRL-C in Postgres CLI cancels queries is incredibly hack-y

https://neon.com/blog/ctrl-c-in-psql-gives-me-the-heebie-jeebies
5•andrenotgiant•2d ago•0 comments

LLMs predict my coffee

https://dynomight.net/coffee/
107•surprisetalk•4d ago•43 comments

You are not your job

https://jry.io/writing/you-are-not-your-job/
121•jryio•15h ago•139 comments

Building an FPGA 3dfx Voodoo with Modern RTL Tools

https://noquiche.fyi/voodoo
177•fayalalebrun•17h ago•40 comments

First and Lego Education Partnership Update

https://community.firstinspires.org/first-lego-education-partnership-update
39•jchin•3d ago•14 comments

More common mistakes to avoid when creating system architecture diagrams

https://www.ilograph.com/blog/posts/more-common-diagram-mistakes/
166•billyp-rva•18h ago•55 comments

"Collaboration" Is Bullshit

https://www.joanwestenberg.com/collaboration-is-bullshit/
76•mitchbob•4h ago•24 comments

How to Attract AI Bots to Your Open Source Project

https://nesbitt.io/2026/03/21/how-to-attract-ai-bots-to-your-open-source-project.html
114•zdw•1d ago•17 comments

I Reverse-Engineered the TiinyAI Pocket Lab from Marketing Photos

https://bay41.com/posts/tiiny-ai-pocket-lab-review/
65•davidklemke•4d ago•19 comments

25 Years of Eggs

https://www.john-rush.com/posts/eggs-25-years-20260219.html
270•avyfain•4d ago•73 comments

The IBM scientist who rewrote the rules of information just won a Turing Award

https://www.ibm.com/think/news/ibm-scientist-charles-bennett-turing-award
118•rbanffy•18h ago•9 comments