]> cvs.zerfleddert.de Git - proxmark3-svn/blobdiff - tools/nonce2key/nonce2key.c
Speedup Mifare Plus Attack v2.1 (stable)
[proxmark3-svn] / tools / nonce2key / nonce2key.c
index 32ea0a68dd454d2a77a335b93c31f2aca9d2ea0e..b08c5cd2774ff79d2d7dc002149e18e595234bfb 100644 (file)
@@ -3,57 +3,63 @@
 #include <inttypes.h>
 #define llx PRIx64
 #include <stdio.h>
+#include <time.h>
 typedef unsigned char byte_t;
 
 int main(const int argc, const char* argv[]) {
-  struct Crypto1State *state;
-  uint32_t pos, uid, nt, nr, rr, nr_diff, ks1, ks2;
-  byte_t bt, i, ks3x[8], par[8][8];
-  uint64_t key, key_recovered;
-  uint64_t par_info;
-  uint64_t ks_info;
-  nr = rr = 0;
-  
-  if (argc < 5) {
-    printf("\nsyntax: %s <uid> <nt> <par> <ks>\n\n",argv[0]);
-    return 1;
-  }
-  sscanf(argv[1],"%08x",&uid);
-  sscanf(argv[2],"%08x",&nt);
-  sscanf(argv[3],"%016"llx,&par_info);
-  sscanf(argv[4],"%016"llx,&ks_info);
-  
-  // Reset the last three significant bits of the reader nonce
-  nr &= 0xffffff1f;
+       struct Crypto1State *state;
+       uint32_t pos, uid, nt, nr, rr, nr_diff, ks1, ks2;
+       byte_t bt, i, ks3x[8], par[8][8];
+       uint64_t key, key_recovered;
+       uint64_t par_info;
+       uint64_t ks_info;
+       nr = rr = 0;
+
+       if (argc < 5) {
+               printf("\nsyntax: %s <uid> <nt> <par> <ks>\n\n",argv[0]);
+               return 1;
+       }
+       sscanf(argv[1],"%08x",&uid);
+       sscanf(argv[2],"%08x",&nt);
+       sscanf(argv[3],"%016"llx,&par_info);
+       sscanf(argv[4],"%016"llx,&ks_info);
   
-  printf("\nuid(%08x) nt(%08x) par(%016"llx") ks(%016"llx")\n\n",uid,nt,par_info,ks_info);
-
-  for (pos=0; pos<8; pos++)
-  {
-    ks3x[7-pos] = (ks_info >> (pos*8)) & 0x0f;
-    bt = (par_info >> (pos*8)) & 0xff;
-    for (i=0; i<8; i++)
-    {
-      par[7-pos][i] = (bt >> i) & 0x01;
-    }
-  }
-
-  printf("|diff|{nr}    |ks3|ks3^5|parity         |\n");
-  printf("+----+--------+---+-----+---------------+\n");
-  for (i=0; i<8; i++)
-  {
-    nr_diff = nr | i << 5;
-    printf("| %02x |%08x|",i << 5, nr_diff);
-    printf(" %01x |  %01x  |",ks3x[i], ks3x[i]^5);
-    for (pos=0; pos<7; pos++) printf("%01x,",par[i][pos]);
-    printf("%01x|\n",par[i][7]);
-  }
+       // Reset the last three significant bits of the reader nonce
+       nr &= 0xffffff1f;
+
+       printf("\nuid(%08x) nt(%08x) par(%016"llx") ks(%016"llx")\n\n",uid,nt,par_info,ks_info);
+
+       for ( pos = 0; pos < 8; pos++ ) {
+               ks3x[7-pos] = (ks_info >> (pos*8)) & 0x0f;
+               bt = (par_info >> (pos*8)) & 0xff;
+
+               for ( i = 0; i < 8; i++) {
+                       par[7-pos][i] = (bt >> i) & 0x01;
+               }
+       }
+
+       printf("|diff|{nr}    |ks3|ks3^5|parity         |\n");
+       printf("+----+--------+---+-----+---------------+\n");
+
+       for ( i = 0; i < 8; i++) {
+               nr_diff = nr | i << 5;
+               printf("| %02x |%08x| %01x |  %01x  |", i << 5, nr_diff, ks3x[i], ks3x[i]^5);
+
+               for ( pos = 0; pos < 7; pos++)
+                       printf("%01x,", par[i][pos]);
+               printf("%01x|\n", par[i][7]);
+       }
+       printf("+----+--------+---+-----+---------------+\n");
+
+       clock_t t1 = clock();
   
-  state = lfsr_common_prefix(nr,rr,ks3x,par);
-  lfsr_rollback_word(state,uid^nt,0);
-  crypto1_get_lfsr(state,&key_recovered);
-  printf("\nkey recovered: %012"llx"\n\n",key_recovered);
-  crypto1_destroy(state);
+       state = lfsr_common_prefix(nr,rr,ks3x,par);
+       lfsr_rollback_word(state,uid^nt,0);
+       crypto1_get_lfsr(state,&key_recovered);
+       printf("\nkey recovered: %012"llx"\n\n",key_recovered);
+       crypto1_destroy(state);
   
-  return 0;
+       t1 = clock() - t1;
+       if ( t1 > 0 ) printf("Time in nonce2key: %.0f ticks \n", (float)t1);
+       return 0;
 }
Impressum, Datenschutz