In this post, I'll be covering: How the autogen keys are generated, How the master machine keys are derived from the autogen keys, How the final machine keys are derived from the master machine keys, How the final keys can be used to decrypt view state messages. And this time, I'll be covering all this for both the legacy and the modern crypto configurations.