crediar has released a tool that can be used to find the XOR key used for encryption and use it to encrypt/decrypt EEPROM savefiles of 3DS games. So how is this useful? For the moment, very little, but this is a first step in the right direction for 3DS hacking. Who knows? it could be sooner than you think before people are able to dump 3DS cards! Anyway, here's a little bit of info about 3DS Saves posted on the 3DBrew wiki.
Quote: 3dbrew wiki
On the 3DS savegames are stored much like on the DS, that is on an EEPROM in the gamecart. On the DS these savegames were stored in plaintext but on the 3DS a layer of encryption was added. This is highly likely a streamcipher, as the contents of several savegames exhibit the odd behaviour that xor-ing certain parts of the savegame together will result in the plaintext appearing.
The reason this works is because the streamcipher used has a period of 512 bytes. That is to say, it will repeat the same keystream after 512 bytes. The way you encrypt with a streamcipher is you XOR your data with the keystream as it is produced. Unfortunately, if your streamcipher repeats and you are encrypting a known plaintext (in our case, zeroes) you are basically giving away your valuable keystream.
So how do you use this to decrypt a savegame on a 3DS? First off, you chunk up the savegame into 512 byte chunks. Then, you bin these chunks by their contents, discarding any that contain only FF. Now look for the most common chunk. This is your keystream. Now XOR the keystream with your original savegame and you should have a fully decrypted savegame. XOR with the keystream again to produce an encrypted savegame.
UPDATE:
0.2b -fixed a bug in the 0xFF block detection
0.2 -de/encrypting now starts at 0x1000 -fixed a few new line errors in the usage info -when de/encrypting only 512byte blocks of 0xFF are skipped now -fixed a bug which would not de/encrypt the last 0x2000 bytes
I had to go out and grab the c++ redistributable package, so now it opens. Next step is actually using the damn thing properly, which may prove more difficult.
Well this is the first step in ROM dumping, if all goes well, we can have the ROMs soon, but no way in hell are we going to get to play them with the current flash cards available.
I wonder if Nintendo realizes that by increasing security with the 3ds, they just gave hackers the most fun game they'll have for the entire lifespan of the console.