Sponsored Links

Sponsored Links

Page 4 of 5 FirstFirst ... 2345 LastLast
Results 31 to 40 of 42



  1. #31
    Senior Member cfwprophet's Avatar
    Join Date
    Jul 2008
    Posts
    1,815
    Sponsored Links
    Sponsored Links
    Ok tryed AES decrypt on the file you have posted but i got a bad file header error message.I will search for other crypting tools and try the other crypting algos too.

    And also i will try the tool that would be used for samy tv's.
    Last edited by cfwprophet; 10-20-2011 at 05:06 PM Reason: Automerged Doublepost

  2. #32
    Senior Member SCE's Avatar
    Join Date
    Jan 2009
    Posts
    172
    Sponsored Links
    Sponsored Links
    Looks like it only decrypts files encrypted with aescrypt...

  3. #33
    Senior Member Foo's Avatar
    Join Date
    Sep 2011
    Posts
    332
    Sponsored Links
    Sponsored Links
    So I'll teach a lil bit about AES ...

    AES stands for Advanced Encryption Standard made by the U.S. Government blah blah blah...

    This is what the decipher is:

    AES is based on a design principle known as a [Register or Login to view links]. It is fast in both [Register or Login to view links] and [Register or Login to view links]. Unlike its predecessor, DES, AES does not use a [Register or Login to view links].

    AES has a fixed [Register or Login to view links] of 128 [Register or Login to view links] and a [Register or Login to view links] of 128, 192, or 256 bits, whereas Rijndael can be specified with block and key sizes in any multiple of 32 bits, with a minimum of 128 bits. The blocksize has a maximum of 256 bits, but the keysize has no theoretical maximum.

    AES operates on a 44 [Register or Login to view links] matrix of bytes, termed the state (versions of Rijndael with a larger block size have additional columns in the state). Most AES calculations are done in a special finite field.

    The AES cipher is specified as a number of repetitions of transformation rounds that convert the input plaintext into the final output of ciphertext. Each round consists of several processing steps, including one that depends on the encryption key. A set of reverse rounds are applied to transform ciphertext back into the original plaintext using the same encryption key.

    High-level description of the algorithm


    1. KeyExpansion—round keys are derived from the cipher key using [Register or Login to view links]
    2. Initial Round
      1. AddRoundKey—each byte of the state is combined with the round key using bitwise xor

    3. Rounds
      1. SubBytes—a non-linear substitution step where each byte is replaced with another according to a [Register or Login to view links].
      2. ShiftRows—a transposition step where each row of the state is shifted cyclically a certain number of steps.
      3. MixColumns—a mixing operation which operates on the columns of the state, combining the four bytes in each column.
      4. AddRoundKey

    4. Final Round (no MixColumns)
      1. SubBytes
      2. ShiftRows
      3. AddRoundKey


    The SubBytes step

    In the SubBytes step, each byte in the matrix is updated using an 8-bit [Register or Login to view links], the [Register or Login to view links]. This operation provides the non-linearity in the [Register or Login to view links]. The S-box used is derived from the [Register or Login to view links] over [Register or Login to view links](28), known to have good non-linearity properties. To avoid attacks based on simple algebraic properties, the S-box is constructed by combining the inverse function with an invertible [Register or Login to view links]. The S-box is also chosen to avoid any fixed points (and so is a [Register or Login to view links]), and also any opposite fixed points.

    The ShiftRows step

    The ShiftRows step operates on the rows of the state; it cyclically shifts the bytes in each row by a certain [Register or Login to view links]. For AES, the first row is left unchanged. Each byte of the second row is shifted one to the left. Similarly, the third and fourth rows are shifted by offsets of two and three respectively. For the block of size 128 bits and 192 bits the shifting pattern is the same. In this way, each column of the output state of the ShiftRows step is composed of bytes from each column of the input state. (Rijndael variants with a larger block size have slightly different offsets). In the case of the 256-bit block, the first row is unchanged and the shifting for second, third and fourth row is 1 byte, 3 bytes and 4 bytes respectively—this change only applies for the Rijndael cipher when used with a 256-bit block, as AES does not use 256-bit blocks.

    The MixColums step

    In the MixColumns step, the four bytes of each column of the state are combined using an invertible [Register or Login to view links]. The MixColumns function takes four bytes as input and outputs four bytes, where each input byte affects all four output bytes. Together with ShiftRows, MixColumns provides [Register or Login to view links] in the cipher.
    During this operation, each column is multiplied by the known matrix that for the 128 bit key is

    The multiplication operation is defined as: multiplication by 1 means leaving unchanged, multiplication by 2 means shifting byte to the left and multiplication by 3 means shifting to the left and then performing [Register or Login to view links] with the initial unshifted value. After shifting, a conditional [Register or Login to view links] with 0x11B should be performed if the shifted value is larger than 0xFF.
    In more general sense, each column is treated as a polynomial over GF(28) and is then multiplied modulo x4+1 with a fixed polynomial c(x) = 0x03 x3 + x2 + x + 0x02. The coefficients are displayed in their [Register or Login to view links] equivalent of the binary representation of bit polynomials from GF(2)[x]. The MixColumns step can also be viewed as a multiplication by a particular [Register or Login to view links] in a [Register or Login to view links]. (This is further explained here: [Register or Login to view links] )

    The AddRoundKey step

    In the AddRoundKey step, the subkey is combined with the state. For each round, a subkey is derived from the main [Register or Login to view links] using [Register or Login to view links]; each subkey is the same size as the state. The subkey is added by combining each byte of the state with the corresponding byte of the subkey using bitwise [Register or Login to view links].

    Optimization of the cipher

    On systems with 32-bit or larger words, it is possible to speed up execution of this cipher by combining SubBytes and ShiftRows with MixColumns, and transforming them into a sequence of table lookups. This requires four 256-entry 32-bit tables, which utilizes a total of four kilobytes (4096 bytes) of memory—one kilobyte for each table. A round can now be done with 16 table lookups and 12 32-bit exclusive-or operations, followed by four 32-bit exclusive-or operations in the AddRoundKey step.
    If the resulting four kilobyte table size is too large for a given target platform, the table lookup operation can be performed with a single 256-entry 32-bit (i.e. 1 kilobyte) table by the use of circular rotates.

    Something Else

    Test vectors are a set of known ciphers for a given input and key. [Register or Login to view links] distributes the reference of AES test vectors as [Register or Login to view links]
    Using a byte-oriented approach, it is possible to combine the SubBytes, ShiftRows, and MixColumns steps into a single round operation.

    Here's something I found on this:

    Good luck.

    Well... those links...
    Attached Thumbnails<br><br> Attached Thumbnails

    SURMDj.png   h3FfBz.png   CnPjW5.png   5Q30kL.png   DA1Pdg.png  
    Attached Files Attached Files

  4. #34
    Senior Member cfwprophet's Avatar
    Join Date
    Jul 2008
    Posts
    1,815
    Quote Originally Posted by Foo View Post
    Looks like it only decrypts files encrypted with aescrypt...
    Not sure about that. They can use AES and have changed the header a bit. Like Nintendo do for .wad files and sony for .pkg files which both will be linux-unix standarts since years.

  5. #35
    Senior Member SCE's Avatar
    Join Date
    Jan 2009
    Posts
    172
    I have found a tool named Cryptool and analyzed the file alot but no luck after all, since we have no idea about the key. Anyway, I have other news.

    I have talked to SamyGo guru. The debug port I have found does not use RS232. It is something else. On the bright side, this time, I have found the RS232 ports of the controller chips.

    U_RS232_RXD
    U_RS232_TXD

    Pin numbers 96 and 97 on page 88. Connector name CN5000, CHIP name IC5000.

    Look at that picture I have taken: http://www.ps3news.com/forums/attach...chmentid=31502

    You can clearly see the 6 pins left side of the chip. Two of them have trace. Those two traces are U_RS232_RXD and U_RS232_TXD, enoguh to get RS232 to work. Now it says 3.3V standby. I think I need to keep the TV in standby mode so that the board will have enoguh current for the rs232 port and the chips to operate.

    I will take a look at this tomorrow. The weekend is here!
    Attached Thumbnails<br><br> Attached Thumbnails

    DSC_0031.jpg  

  6. #36
    Senior Member cfwprophet's Avatar
    Join Date
    Jul 2008
    Posts
    1,815
    Great i'm waiting with patience for you to have progress on this. I'm here if you need help for something.

  7. #37
    Senior Member SCE's Avatar
    Join Date
    Jan 2009
    Posts
    172
    RS232 thing is a little bit risky. I gotta adjust the voltages right so that I won't fry anything. I am talking to other guys. I will inform you when something new happens.

  8. #38
    Senior Member SCE's Avatar
    Join Date
    Jan 2009
    Posts
    172
    Allright guys. After looking for a needle in the haystack, I have finally found the port, with the help of the SamyGo project leader erdem. Here are the brand new info. Finally, we have an aim.

    The port is named DTT. Probabbly stands for Debug Test System, Debug Test Target.

    It's an 18 pin port but we are not going to use all of them:

    And it's at the back side of the PCB //doh

    I even had a picture of it when I opened the TV up back then, how could I know it was the right port

    Port name: CN5502 1-774-667-51 CONNECTOR, FFC/FPC 18P
    Attached Thumbnails<br><br> Attached Thumbnails

    adszjgs.jpg   adszpka.png   adszrba.png   DSC_0041.jpg  

  9. #39
    Senior Member SCE's Avatar
    Join Date
    Jan 2009
    Posts
    172
    Ok guys I need help here. I can not connect RS232 directly to the debug port. That's why I have ordered a USB/TTL converter.

    CP2102 based USB/RS232 Transfer circuit

    Specifications:
    Built-in USB to RS232 Transfer chip.
    Designed to be used for USB to TTL electronic projects.
    TTL interface output, easy to connect to your MCU.
    Status LED.
    Dual 3.3V and 5V Power output, work with 3.3v and 5v target device.
    Compact design. V1.0
    Now the question is, there are 3 GND pins on the port:

    http://www.ps3news.com/forums/attach...chmentid=31536

    How will I do the wiring? One for M_UART0_RX, another for M_UART0_TX, GND to pin 11 GND.

    Do I have to connect 3.3V pin to port 5? Port 14? Or both?
    Attached Thumbnails<br><br> Attached Thumbnails

    USB-TTL-Donusturucu-CP2102__46564724_0.jpg  

  10. #40
    Senior Member Tidusnake666's Avatar
    Join Date
    Sep 2008
    Posts
    802
    If I was doing this, I would have attached to both of them, seems like enough grounding for 3.3. But I'm a slacker when it comes to hardware-things, so you may not bother listening to me before someone else, more qualified answers you

    Awesome progress, BTW, that thing what you're doing, it's cool.

 

Sponsored Links
Page 4 of 5 FirstFirst ... 2345 LastLast
Advertising - Affiliates - Contact Us - PS3 Downloads - Privacy Statement - Site Rules - Top - © 2014 PlayStation 3 News