MontysEvilTwin
Well-Known Member
If your results are correct, the improvement is about 15.5%.Half-hour BBC news from BBC1 today with all-zeroes key.
old - 398.56s
new - 336.41
so an improvement but only 6-7% there..
If your results are correct, the improvement is about 15.5%.Half-hour BBC news from BBC1 today with all-zeroes key.
old - 398.56s
new - 336.41
so an improvement but only 6-7% there..
I think so.Are you sure?
I have a copy of the dehumidified file structure for the latest 2000T upgrade and have tried poking around in there looking for clues. Not convinced I'm looking in the right place. Of course, not being an expert in the firmware and with no obvious way to do a memory dump, I'm probably widdling in the wind.One idea. It may not be possible without custom firmware, but is there a way of doing a memory dump to disk on the HDR-2000T? The location where the key is stored on the HDR-FOX is known: the HDR-2000T key could be stored in the same or a similar location so if the flash memory could be read it may be possible to find the key.
Are you going to update the non-native versions of stripts ?
Could we have an example of the syntax for this new command
humax# stripts -/ 11111111111111111111111111111111 test/Bargain\ Hunt_20180502_1218
Encryption key is INCORRECT for this recording.
On what basis do you refute my mathematical analysis in post 147? Your assertion has reasonable confidence if the key length is 16 bytes (112 effective bits) but not if it is 24 bytes.I think so.
As af123 pointed out 4c4d65d47880c8ef should decrypt to ffffffffffffffff - as can be deduced from the nature of the encryption. There is another repeating pattern from my 2000T and that is a052871b5dce41a2 should decrypt to 0000000000000000 (8 zero bytes). So the simplest test is to decrypt to 8* (0xff) and check if the same key decrypts the other 8 bytes to 8* (0x00). If it does I'd be reasonably confident the key had been found.
Now that @af123 has figured out encryption works on the HDR-FOX, there is a method to read the key from the internal memory, but I do not know if this is possible without custom firmware.I have a copy of the dehumidified file structure for the latest 2000T upgrade and have tried poking around in there looking for clues. Not convinced I'm looking in the right place. Of course, not being an expert in the firmware and with no obvious way to do a memory dump, I'm probably widdling in the wind.
No, you are conflating two of my statements there. I have said that the 64-bit crib is enough to determine whether a key is right and, as you pointed out, I am wrong there - it would only provide a candidate key. I also said that we should be able to brute force the key for a HD/HDR since the key space is much reduced due to the use of digits only in the last 10 places (and only even digits at that due to the parity) and the predictable first three bytes (there are 3 options for MAC address prefix on an HDR and 2 for an HD).. it would still take a while but in the order of days making it practical. That does not make it practical to brute force an arbitrary key.af123 believes having a 64-bit sample of the cyphertext and plaintext is sufficient to determine the key by brute force, but I don't agree
How is this any different from doing the same with a StdDef recording - which is what I have been working with? I ftp'd a StdDef .ts file (encrypted) and streamed the same file (decrypted) and compared the results. af123 has taken an encrypted 2000T recording and deduced (correctly) that a known repeating set of bytes decrypts to 8* (0xff).I have another idea which may or may not be helpful. If you make a brief recording from a high def. channel and copy it over encrypted, then Foxy the hmt file and copy again onto USB to decrypt, won't this give you both samples of cyphertext and the corresponding plaintext?
I think "refute" and "assertion" are a bit strong. I did prefix it by "I think so" - which doesn't really lend itself to certainty.On what basis do you refute my mathematical analysis in post 147? Your assertion has reasonable confidence if the key length is 16 bytes (112 effective bits) but not if it is 24 bytes.
I missed this bit. If you think it's worth the effort I can try and put together a small sample of encrypted/decrypted files. (Probably very small, I'm not sure what the upload limit is on here).but I don't see why a substantial sample can't be made available for us all to look at - where's the harm?
No point (as per post 168), and I missed this bit:I missed this bit. If you think it's worth the effort I can try and put together a small sample of encrypted/decrypted files. (Probably very small, I'm not sure what the upload limit is on here).
I fancy this is a crypto-hash function.a reference to a get_secure_serialnumber function. Is that securely get the serial number or get a secure serial number - which isn't the serial number displayed on the back of the device?
Given the broadcom API, I'm pretty sure it will be 112-bits like the HD/HDR.. the relevant function is NEXUSSecurityLoadClearKey() and it takes a 128-bit argument which can then either be used for AES-128 or 2-key 3DES. There's always a chance that the API has been extended but the Broadcom documentation is not available.there is still the practical problem of attempting to discover the (whatever size) key for the 2000T.
The code is not encrypted? Oh, I'll have a quick look then..Poking around in the 2000T update
For anyone labouring under the idea they only have Windows and can't run the Linux version of stripts: just boot a Live Linux CD/DVD/USB (it doesn't hurt your PC, and is handy to have around). Here's one for downloading and burning from ISO, or a few quid will get one on the cover of a Linux magazine from a news stand:A Windows version would be fantastic and it would be interesting to see how fast a high end PC/Workstation could decrypt the recordings
The code is not encrypted? Oh, I'll have a quick look then..
Extracting the filesystem and kernel from the update is easy enough (although the currently released humidify utility won't do it properly as the HDF archive contains a hole)
That's in the web browser client code.. The browser provides some methods to the remote web server, one of which is get serial number so I assume this is related.. it seems to RSA encrypt the serial number with a local certificate.reference to a getsecureserialnumber function
Using a private key that is common across all units, and a shared secret that's also common.. the 2000T code is so much easier to work with than the HDR!That's in the web browser client code.. The browser provides some methods to the remote web server, one of which is get serial number so I assume this is related.. it seems to RSA encrypt the serial number with a local certificate.