Mike Cherba wrote:

> This version of the cam has a different unlock procedure than the old
> ones and whoever ported the OPS code to linux did a bang up job of
> making it confusing as hell.  Took me a couple of hours to begin making
> sense of it.  So anyone know anything about cracking a crypto alorith if
> you have a selection of known pairs and need to find the relationship.
> i keep thinking I need an app which will walk through a number of know
> crypto alogithms for a given key pair and see which ones might work and
> then try each on the other known good pairs.  There doesn't seem to be
> much SW like this for Linux.  Mostly windows apps for the Script Kiddie
> crowd and keygens.

Either (a) the people who designed the crypto system were incompetent
or (b) you'll have to try keys for 1,000,000,000 years.  The former
happens occasionally (HDCP, for example[1]).

Most likely, it uses an RSA public key system.  The camera knows the
public key, and the lab knows the private key.  That's a lot like SSL.
If I were designing it, SSL is what I'd copy.

How about reprogramming the flash, either replacing the public key
with one whose private counterpart you know, or bypassing the
authentication handshake altogether?

If you're intent on brute forcing the key, you'll still be ahead if
you read the algorithm off the flash chip.

Even talking about this is probably in violation of the US DMCA, so be
sure you do the actual work in a civilized country.


[1] http://cryptome.org/hdcp-weakness.htm

-- 
Bob Miller                              K<bob>
                                        [EMAIL PROTECTED]
_______________________________________________
EUGLUG mailing list
[email protected]
http://www.euglug.org/mailman/listinfo/euglug

Reply via email to