Is it possible to program the new N2 cards yet? No, not at this time Before you listen to anyone who claims to know anything, heed this advice. The layman is also welcome to read this thread for it will give him a realistic picture of the new encryption technology, but he should refrain from participating in this discussion if he has nothing of technical merit to contribute. Otherwise, this thread will degenerate into useless rambling.
I decided to post my findings because there is so much mis-information out there. There has been much talk recently that Nagra 2 is an impenetrable fortress that will never be compromised, much like the P4 card. At any rate, that is the prevailing view among the layman. Perhaps this thread will enlighten many of you. Anyone who has logged the Nagra 2 datastream and compared it to the Nagra 1 datastream will be astonished - nothing much has changed!
Some of the commands have been renamed and slightly re-formatted. Why were the commands re-named? Most likely so that a Nagra 1 card wouldn't get confused with commands directed to the Nagra 2 card and vice-versa,while both the Nagra 1 and 2 streams were active together. Now, there are some commands that come down in plaintext and others that are encrypted. The plaintext commands are trivial and can be easily emulated for both Nagra 1 and 2 and we won't bother discussing them.
Since this is the heart of the Nagra 2 encryption, it is quite astonishing that nobody has much to say about these commands even when the demise of Nagra 1 is upon us. Well, here is where the discussion gets more technical, so do try to follow along. The first question we need to ask is why are there 3 more packets? So, we would expect 4 more encrypted packets over the original 4 in Nagra 1.
But that would be a total of 8 packets and not 7? But remember, with Nagra 1, there were some pad bytes that they are probably now using for the extra control words. So 7 encrypted packets sounds about right. Now, what is the encryption being used? We can certainly rule out 64 byte RSA because there are only 56 bytes of data. So it has to be a block cipher that operates on 8 bytes or 64 bits at a time.
We can rule out any block ciphers that operate on 16 bytes or bits at a time because we have 7 packets and not 8. So what are the cipher candidates? The problem with these latter ciphers is that they have either been proven unreliable or simply aren't widely implemented on silicon.
I am hesitant to even include IDEA in the list because there has been no rush by industry to adopt it as a replacement to DES and a commercial license must be granted by the inventors for its use. IDEA also uses a bit key and operates on 64 bits of data. Also, patents filed by Kudelski indicate a 64 bit ECM key and not bit. Many in the testing community have suggested that bit IDEA is being used. Yet, they have not offered any proof of this.
They are welcome to substantiate their claims here. SoftCam SoftCam by enigma SoftCam Keys 11 23 SoftCam 11 17 SoftCam Keys 12 11 SoftCam Keys 29 10 Softcam Keys 28 10 SoftCam 10 25 SoftCam Keys 18 10 Softcam by KhanSat. SoftCam Keys 09 10 SoftCam by enigma …. Bulsat Official Firmware Moresat.
Official Firmware Morebox. We are introducing some new features in this new software that we hope help to increase stability. Due to this and the will to increase the compatibility with some protocols we do this sw release now. This is a forced sw update as we found smarter ways to handle protocols and those make the.
The service will start using this new protocols December 7th , by then, users should have. For All Football matches- Tuesday
0コメント