bin
June 21st, 2006, 12:35
First of all - great to find a forum like that here ! Thanks a lot to all contributors.
My first post, attention, newby ......
Background: here in germany exists a private pay-tv company which is hacked since more then six month. They are using the nagra2 encryption system, but I think thats not the point here.
The hack is done with smartcards (basing on Chip Atmel AT90SC6464C). Currently there are 3 difernt models on the market (cerebro, didem, daytona).
Prices for this cards range between 70-100 euros.
These cards are updatet via hex files which could be dl from different ulc's.
These files are encrypted.
I personally don't use one of this cards , but today I had a closer look to one of these files for the modell daytona, cause they are publishing a sub file for annother pay-tv company which is using annother encrytion system (easytv = cryptoworks)
The point: the key easytv is using is public.
Am I right now that if I have the crypted file for the atmel card and the key (which must be included in that file) this could (theoreticaly) be attacked by a known plaintext attack ?
This is a part of the hex file:
DTCDATA1 61 4E2E
FEB0000080
56C7870DBF4DC2903A5D5B4B835F350A
2F370561D7A5CAE823E3E3A2D4DE08FC
1D26480A8C22A72027D137696433F861
495185347FF442220FC8862C95B1B37A
AFEC37EBF9534FD5F1F9047571EDA227
195C50111661521890D919B35F552346
5E26F617B3A9FFDC23E051990D78EBF3
4006FAB508D2B62D14B59A68C214AC91
FEB1000090
EE7064B2422693D4E894200C7D493E13
AB39EDA57F62
And if this could be done - are there tools out to do that job ?
Thanks
bin
My first post, attention, newby ......
Background: here in germany exists a private pay-tv company which is hacked since more then six month. They are using the nagra2 encryption system, but I think thats not the point here.
The hack is done with smartcards (basing on Chip Atmel AT90SC6464C). Currently there are 3 difernt models on the market (cerebro, didem, daytona).
Prices for this cards range between 70-100 euros.
These cards are updatet via hex files which could be dl from different ulc's.
These files are encrypted.
I personally don't use one of this cards , but today I had a closer look to one of these files for the modell daytona, cause they are publishing a sub file for annother pay-tv company which is using annother encrytion system (easytv = cryptoworks)
The point: the key easytv is using is public.
Am I right now that if I have the crypted file for the atmel card and the key (which must be included in that file) this could (theoreticaly) be attacked by a known plaintext attack ?
This is a part of the hex file:
DTCDATA1 61 4E2E
FEB0000080
56C7870DBF4DC2903A5D5B4B835F350A
2F370561D7A5CAE823E3E3A2D4DE08FC
1D26480A8C22A72027D137696433F861
495185347FF442220FC8862C95B1B37A
AFEC37EBF9534FD5F1F9047571EDA227
195C50111661521890D919B35F552346
5E26F617B3A9FFDC23E051990D78EBF3
4006FAB508D2B62D14B59A68C214AC91
FEB1000090
EE7064B2422693D4E894200C7D493E13
AB39EDA57F62
And if this could be done - are there tools out to do that job ?
Thanks
bin