added readme.txt again in tools/nonce2key
if (par_info == 0)
PrintAndLog("Parity is all zero, trying special attack! Just wait for few more seconds...");
if (par_info == 0)
PrintAndLog("Parity is all zero, trying special attack! Just wait for few more seconds...");
- state = lfsr_common_prefix(nr, rr, ks3x, par);
+ state = lfsr_common_prefix(nr, rr, ks3x, par, (par_info == 0));
state_s = (int64_t*)state;
//char filename[50] ;
state_s = (int64_t*)state;
//char filename[50] ;
*/
static struct Crypto1State*
check_pfx_parity(uint32_t prefix, uint32_t rresp, uint8_t parities[8][8],
*/
static struct Crypto1State*
check_pfx_parity(uint32_t prefix, uint32_t rresp, uint8_t parities[8][8],
- uint32_t odd, uint32_t even, struct Crypto1State* sl)
+ uint32_t odd, uint32_t even, struct Crypto1State* sl, uint32_t no_par)
- uint32_t ks1, nr, ks2, rr, ks3, c, good = 1, no_par = 1;
-
- for (int i = 0; i < 8; i++) {
- for (int j = 0; j < 8; j++) {
- if (parities[i][j] != 0) {
- no_par = 0;
- break;
- }
- }
- }
+ uint32_t ks1, nr, ks2, rr, ks3, c, good = 1;
for(c = 0; good && c < 8; ++c) {
sl->odd = odd ^ fastfwd[1][c];
for(c = 0; good && c < 8; ++c) {
sl->odd = odd ^ fastfwd[1][c];
* Implentation of the common prefix attack.
*/
struct Crypto1State*
* Implentation of the common prefix attack.
*/
struct Crypto1State*
-lfsr_common_prefix(uint32_t pfx, uint32_t rr, uint8_t ks[8], uint8_t par[8][8])
+lfsr_common_prefix(uint32_t pfx, uint32_t rr, uint8_t ks[8], uint8_t par[8][8], uint32_t no_par)
{
struct Crypto1State *statelist, *s;
uint32_t *odd, *even, *o, *e, top;
{
struct Crypto1State *statelist, *s;
uint32_t *odd, *even, *o, *e, top;
odd = lfsr_prefix_ks(ks, 1);
even = lfsr_prefix_ks(ks, 0);
odd = lfsr_prefix_ks(ks, 1);
even = lfsr_prefix_ks(ks, 0);
- s = statelist = malloc((sizeof *statelist) << 20);
+ s = statelist = malloc((sizeof *statelist) << 21); // need more for no_par special attack. Enough???
if(!s || !odd || !even) {
free(statelist);
statelist = 0;
if(!s || !odd || !even) {
free(statelist);
statelist = 0;
for(top = 0; top < 64; ++top) {
*o += 1 << 21;
*e += (!(top & 7) + 1) << 21;
for(top = 0; top < 64; ++top) {
*o += 1 << 21;
*e += (!(top & 7) + 1) << 21;
- s = check_pfx_parity(pfx, rr, par, *o, *e, s);
+ s = check_pfx_parity(pfx, rr, par, *o, *e, s, no_par);
struct Crypto1State* lfsr_recovery64(uint32_t ks2, uint32_t ks3);
uint32_t *lfsr_prefix_ks(uint8_t ks[8], int isodd);
struct Crypto1State*
struct Crypto1State* lfsr_recovery64(uint32_t ks2, uint32_t ks3);
uint32_t *lfsr_prefix_ks(uint8_t ks[8], int isodd);
struct Crypto1State*
-lfsr_common_prefix(uint32_t pfx, uint32_t rr, uint8_t ks[8], uint8_t par[8][8]);
+lfsr_common_prefix(uint32_t pfx, uint32_t rr, uint8_t ks[8], uint8_t par[8][8], uint32_t no_par);
uint8_t lfsr_rollback_bit(struct Crypto1State* s, uint32_t in, int fb);
uint8_t lfsr_rollback_bit(struct Crypto1State* s, uint32_t in, int fb);
%.o : %.c
$(CC) $(CFLAGS) -c -o $@ $<
%.o : %.c
$(CC) $(CFLAGS) -c -o $@ $<
$(CC) $(CFLAGS) $(LDFLAGS) -o $@ $(OBJS) $<
clean:
$(CC) $(CFLAGS) $(LDFLAGS) -o $@ $(OBJS) $<
clean:
printf("%01x|\n",par[i][7]);
}
printf("%01x|\n",par[i][7]);
}
- state = lfsr_common_prefix(nr,rr,ks3x,par);
+ state = lfsr_common_prefix(nr,rr,ks3x,par,0);
lfsr_rollback_word(state,uid^nt,0);
crypto1_get_lfsr(state,&key_recovered);
printf("\nkey recovered: %012" PRIx64 "\n\n",key_recovered);
lfsr_rollback_word(state,uid^nt,0);
crypto1_get_lfsr(state,&key_recovered);
printf("\nkey recovered: %012" PRIx64 "\n\n",key_recovered);
--- /dev/null
+To test the nonce2key tool.
+
+:: tip
+You can use the output from "hf mf mifare" to use with this tool.
+
+:: sample
+./nonce2key e9cadd9c a8bf4a12 a020a8285858b090 050f010607060e07