optimized_ikeys.h 2.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566
  1. //-----------------------------------------------------------------------------
  2. // Borrowed initially from https://github.com/holiman/loclass
  3. // More recently from https://github.com/RfidResearchGroup/proxmark3
  4. // Copyright (C) 2014 Martin Holst Swende
  5. // Copyright (C) Proxmark3 contributors. See AUTHORS.md for details.
  6. //
  7. // This program is free software: you can redistribute it and/or modify
  8. // it under the terms of the GNU General Public License as published by
  9. // the Free Software Foundation, either version 3 of the License, or
  10. // (at your option) any later version.
  11. //
  12. // This program is distributed in the hope that it will be useful,
  13. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  14. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  15. // GNU General Public License for more details.
  16. //
  17. // See LICENSE.txt for the text of the license.
  18. //-----------------------------------------------------------------------------
  19. // WARNING
  20. //
  21. // THIS CODE IS CREATED FOR EXPERIMENTATION AND EDUCATIONAL USE ONLY.
  22. //
  23. // USAGE OF THIS CODE IN OTHER WAYS MAY INFRINGE UPON THE INTELLECTUAL
  24. // PROPERTY OF OTHER PARTIES, SUCH AS INSIDE SECURE AND HID GLOBAL,
  25. // AND MAY EXPOSE YOU TO AN INFRINGEMENT ACTION FROM THOSE PARTIES.
  26. //
  27. // THIS CODE SHOULD NEVER BE USED TO INFRINGE PATENTS OR INTELLECTUAL PROPERTY RIGHTS.
  28. //-----------------------------------------------------------------------------
  29. // It is a reconstruction of the cipher engine used in iClass, and RFID techology.
  30. //
  31. // The implementation is based on the work performed by
  32. // Flavio D. Garcia, Gerhard de Koning Gans, Roel Verdult and
  33. // Milosch Meriac in the paper "Dismantling IClass".
  34. //-----------------------------------------------------------------------------
  35. #ifndef IKEYS_H
  36. #define IKEYS_H
  37. #include <inttypes.h>
  38. /**
  39. * @brief
  40. *Definition 11. Let the function loclass_hash0 : F 82 × F 82 × (F 62 ) 8 → (F 82 ) 8 be defined as
  41. * loclass_hash0(x, y, z [0] . . . z [7] ) = k [0] . . . k [7] where
  42. * z'[i] = (z[i] mod (63-i)) + i i = 0...3
  43. * z'[i+4] = (z[i+4] mod (64-i)) + i i = 0...3
  44. * ẑ = check(z');
  45. * @param c
  46. * @param k this is where the diversified key is put (should be 8 bytes)
  47. * @return
  48. */
  49. void loclass_hash0(uint64_t c, uint8_t k[8]);
  50. /**
  51. * @brief Performs Elite-class key diversification
  52. * @param csn
  53. * @param key
  54. * @param div_key
  55. */
  56. void loclass_diversifyKey(const uint8_t* csn, const uint8_t* key, uint8_t* div_key);
  57. /**
  58. * @brief Permutes a key from standard NIST format to Iclass specific format
  59. * @param key
  60. * @param dest
  61. */
  62. #endif // IKEYS_H