Presumably, it was reverse-engineered out of boot0, which has been possible to dump for almost 2 years.
Well, that was embarassing <_< Of course whatever that decrypts it needs to have the IV, and thus he got it from there. Maybe it was good that I got some sleep after writing it ;_;
None the less, thanks for the response mate!
What mean iv? Is an abbreviation of something? If I understand, in the boot0 you found the boot1 iv used to descript the first 0x10 bytes of the boot1? I love that shit is very interesting..
MN1 already answered you on what an IV is. Anyway, if you find it interesting, you should begin reading up on it - it is indeed very interesting!
Here is a good example for, why you need to utilize your cipher in a way that uses an IV:
http://i.stack.imgur.com/bXAUL.png
Electronic Code Book mode (ECB) is one where you just encrypt your plaintext blocks each for themselves, so every white group of pixels becomes the same encrypted something else, etc. As you can see, it is still pretty easy to see the places that was white before, as all identical blocks all have the new same color/look now. Chain Block Cipher mode (and pretty much all other modes) on the other hand also utilises the value of the earlier block in the encryption of the new block, thus two identical blocks will never look the same.
The trick here is that the very first block we encrypt, will have no block before it, which has a value we can use in the encryption of this block. Thus we need an initialisation vector.
Its really fundamental cryptology, and if you like it - read up on it! Modes of operation for ciphers are one of the easiest concepts to grasp as a start, as it involves no math really. (So gogogo
)