Nagra Hex block Decryption

Status
Not open for further replies.
From the above algo the length of C is 0x68 bytes but from the log I have the cmd03 payload is 0x6C. What's going wrong ??


again.. you have log only from non original ci module.. try make loh from provider STB or CI module and decrypt all commands step by step and you will be see
 
again.. you have log only from non original ci module.. try make loh from provider STB or CI module and decrypt all commands step by step and you will be see
Unfortunately I have no access to the equipment you suggest. If you have such log you or someone else please send it to me.
 
A doubt,
The pdf says "Data88 = First 0x18 hex bytes are expanded using NNRSA idea expand which will generate 2 Prime numbers 0x34 bytes each."

We know;
Data88 = FF4D54D984C85F83E0441945FC56B213243ABA7FBC24D05B 9D7EEE .......... 34F15CD99C269B83568114C
First_18 = FF4D54D984C85F83E0441945FC56B213243ABA7FBC24D05B

Can someone expand First_18 and show me the values of p_34 and q_34?
I got :
Data ..: ff4d54d984c85f83e0441945fc56b213243aba7fbc24d05b
p_34 ..: ae13323b0fdc712e9e7456c83ccf936fa68180eef7a047ea64ae70e4f5c31f75791979eb99c5d34222ae0b666c37010fe2588c3b
q_34 ..: dc136657d99d51ac4e34ee9df817986e7e9f569fe590c0908dc2289952809acf541dff85907bab37ac96a2bd250d65b5ca5f792d
p is not prime
q is not prime


But they are not correct because they are not primes.
 
A doubt,
The pdf says "Data88 = First 0x18 hex bytes are expanded using NNRSA idea expand which will generate 2 Prime numbers 0x34 bytes each."


We know;
Data88 = FF4D54D984C85F83E0441945FC56B213243ABA7FBC24D05B 9D7EEE .......... 34F15CD99C269B83568114C
First_18 = FF4D54D984C85F83E0441945FC56B213243ABA7FBC24D05B


Can someone expand First_18 and show me the values of p_34 and q_34?
I got :
Data ..: ff4d54d984c85f83e0441945fc56b213243aba7fbc24d05b
p_34 ..: ae13323b0fdc712e9e7456c83ccf936fa68180eef7a047ea64ae70e4f5c31f75791979eb99c5d34222ae0b666c37010fe2588c3b
q_34 ..: dc136657d99d51ac4e34ee9df817986e7e9f569fe590c0908dc2289952809acf541dff85907bab37ac96a2bd250d65b5ca5f792d
p is not prime
q is not prime


But they are not correct because they are not primes.
maybe this is wrong "Data88=First 0x18 hex bytes are expanded using NNRSA idea expand which will generate 2 Prime numbers 0x34 bytes each"
"Data88=First 0x18 hex bytes are expanded using NNRSA idea expand which will generate 2 Prime numbers 0x30 bytes each":)
 
"Data88=First 0x18 hex bytes are expanded using NNRSA idea expand which will generate 2 Prime numbers 0x30 bytes each"

Data..: ff4d54d984c85f83e0441945fc56b213243aba7fbc24d05b
e.....: 10001
p_30..: ae13323b0fdc712e9e7456c83ccf936fa68180eef7a047ea64ae70e4f5c31f75791979eb99c5d34222ae0b666c3705a9
q_30..: e25887a15c136657d99d51ac4e34ee9df817986e7e9f569fe590c0908dc2289952809acf541dff85907bab37ac96a373
N_60..: 99e9252b4079e3459fd42fcc177fcc9a5b52e1ab1595ef83953ff2866c3a90b7f5868bd32ab27c5ab765a728d24d765cd0b133cf16f32c1e223d1e78df22e3d6bab81ff1b8071e44a55773109adec08a149e6bc12ce35b23acf6d043825825eb
p is prime
q is prime

E_60..: 26a6a008ee962d76ec9e52aa843439e3818f9cd06409552ecc2a54f360f68c254669556fe047166789aae381a2de851c8155713c79a9ca7293ef7a21b82631145a1588876ec574d40dd057996511b8e9ecfa44087385a46ec49ab7180d1b1421


Now ok !
 
I think that if we have only dt05_10 to the log then we have only generic pairing and the rsa68 is calculated according to pdf. If we had dt05_20 then we had to expand the 0x18 bytes of the unique rsa88 to 2 0x34 primes for the calculation of rsa68. Please tell if I am wrong.
 
I think that if we have only dt05_10 to the log then we have only generic pairing and the rsa68 is calculated according to pdf. If we had dt05_20 then we had to expand the 0x18 bytes of the unique rsa88 to 2 0x34 primes for the calculation of rsa68. Please tell if I am wrong.


this is not important known for you, because HD+ use only generic pairing mode
 
  • Like
Reactions: jor
everyone does what they want

klivo you think sec24 does business ok does not help him and the same for others

what's the point of fighting if it's just annoying the forum and its members with stupid topics that won't move anyone forward

Don't forget the world of sat is very small I said and again I know who is who


I ask again my question I would like if possible to have some information on the rsa mod

thank you
 
"Data88=First 0x18 hex bytes are expanded using NNRSA idea expand which will generate 2 Prime numbers 0x30 bytes each"

Hi,
where i find information about NNRSA idea expand??

Thanks
 
Need help for DNASP482 ? Generic pairing
I've flash dump

Thank All
 
Can someone help me ? I created my own rsas of 1024 bits 0x80 hex to sign my two blocks 016c + 017c but even then deco does not start, what will it lack even more? already signed with mdc5 the two blocks and does not start.
 
Excuse me, I didn't understand what you're trying to do.
you resign your blocks and reinject to the box what's the point of doing this?

and is rsa right?
 
This is great nagra secret!
Find out this and you can build your kernel, block 016c and much, much more.

I want to sign one kernel.

Suspect rsa is E2 EE E3 53 AA C2 56 48 0F 61 95 67 C4 13 88 BA , 80 bytes
 
Status
Not open for further replies.
Back
Top