mirror of
https://github.com/RfidResearchGroup/proxmark3.git
synced 2024-12-27 10:34:08 +08:00
70 lines
3.4 KiB
C
70 lines
3.4 KiB
C
|
//-----------------------------------------------------------------------------
|
||
|
// Copyright (C) 2016, 2017 by piwi
|
||
|
//
|
||
|
// This code is licensed to you under the terms of the GNU GPL, version 2 or,
|
||
|
// at your option, any later version. See the LICENSE.txt file for the text of
|
||
|
// the license.
|
||
|
//-----------------------------------------------------------------------------
|
||
|
// Implements a card only attack based on crypto text (encrypted nonces
|
||
|
// received during a nested authentication) only. Unlike other card only
|
||
|
// attacks this doesn't rely on implementation errors but only on the
|
||
|
// inherent weaknesses of the crypto1 cypher. Described in
|
||
|
// Carlo Meijer, Roel Verdult, "Ciphertext-only Cryptanalysis on Hardened
|
||
|
// Mifare Classic Cards" in Proceedings of the 22nd ACM SIGSAC Conference on
|
||
|
// Computer and Communications Security, 2015
|
||
|
//-----------------------------------------------------------------------------
|
||
|
//
|
||
|
// brute forcing is based on @aczids bitsliced brute forcer
|
||
|
// https://github.com/aczid/crypto1_bs with some modifications. Mainly:
|
||
|
// - don't rollback. Start with 2nd byte of nonce instead
|
||
|
// - reuse results of filter subfunctions
|
||
|
// - reuse results of previous nonces if some first bits are identical
|
||
|
//
|
||
|
//-----------------------------------------------------------------------------
|
||
|
// aczid's Copyright notice:
|
||
|
//
|
||
|
// Bit-sliced Crypto-1 brute-forcing implementation
|
||
|
// Builds on the data structures returned by CraptEV1 craptev1_get_space(nonces, threshold, uid)
|
||
|
/*
|
||
|
Copyright (c) 2015-2016 Aram Verstegen
|
||
|
|
||
|
Permission is hereby granted, free of charge, to any person obtaining a copy
|
||
|
of this software and associated documentation files (the "Software"), to deal
|
||
|
in the Software without restriction, including without limitation the rights
|
||
|
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
||
|
copies of the Software, and to permit persons to whom the Software is
|
||
|
furnished to do so, subject to the following conditions:
|
||
|
|
||
|
The above copyright notice and this permission notice shall be included in
|
||
|
all copies or substantial portions of the Software.
|
||
|
|
||
|
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||
|
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||
|
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
||
|
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||
|
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
||
|
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
|
||
|
THE SOFTWARE.
|
||
|
*/
|
||
|
|
||
|
#ifndef HARDNESTED_BITARRAY_CORE_H__
|
||
|
#define HARDNESTED_BITARRAY_CORE_H__
|
||
|
|
||
|
#include <stdint.h>
|
||
|
|
||
|
extern uint32_t *malloc_bitarray(uint32_t x);
|
||
|
extern void free_bitarray(uint32_t *x);
|
||
|
extern uint32_t bitcount(uint32_t a);
|
||
|
extern uint32_t count_states(uint32_t *A);
|
||
|
extern void bitarray_AND(uint32_t *A, uint32_t *B);
|
||
|
extern void bitarray_low20_AND(uint32_t *A, uint32_t *B);
|
||
|
extern uint32_t count_bitarray_AND(uint32_t *A, uint32_t *B);
|
||
|
extern uint32_t count_bitarray_low20_AND(uint32_t *A, uint32_t *B);
|
||
|
extern void bitarray_AND4(uint32_t *A, uint32_t *B, uint32_t *C, uint32_t *D);
|
||
|
extern void bitarray_OR(uint32_t *A, uint32_t *B);
|
||
|
extern uint32_t count_bitarray_AND2(uint32_t *A, uint32_t *B);
|
||
|
extern uint32_t count_bitarray_AND3(uint32_t *A, uint32_t *B, uint32_t *C);
|
||
|
extern uint32_t count_bitarray_AND4(uint32_t *A, uint32_t *B, uint32_t *C, uint32_t *D);
|
||
|
|
||
|
#endif
|