recover_pk.py: replace secp192r1 by prime192v1
[RRG-proxmark3.git] / armsrc / optimized_ikeys.h
blob2aa762eea16a8f769f2f43c57970102175322ecb
1 //-----------------------------------------------------------------------------
2 // Borrowed initially from https://github.com/holiman/loclass
3 // Copyright (C) 2014 Martin Holst Swende
4 // Copyright (C) Proxmark3 contributors. See AUTHORS.md for details.
5 //
6 // This program is free software: you can redistribute it and/or modify
7 // it under the terms of the GNU General Public License as published by
8 // the Free Software Foundation, either version 3 of the License, or
9 // (at your option) any later version.
11 // This program is distributed in the hope that it will be useful,
12 // but WITHOUT ANY WARRANTY; without even the implied warranty of
13 // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 // GNU General Public License for more details.
16 // See LICENSE.txt for the text of the license.
17 //-----------------------------------------------------------------------------
18 // WARNING
20 // THIS CODE IS CREATED FOR EXPERIMENTATION AND EDUCATIONAL USE ONLY.
22 // USAGE OF THIS CODE IN OTHER WAYS MAY INFRINGE UPON THE INTELLECTUAL
23 // PROPERTY OF OTHER PARTIES, SUCH AS INSIDE SECURE AND HID GLOBAL,
24 // AND MAY EXPOSE YOU TO AN INFRINGEMENT ACTION FROM THOSE PARTIES.
26 // THIS CODE SHOULD NEVER BE USED TO INFRINGE PATENTS OR INTELLECTUAL PROPERTY RIGHTS.
27 //-----------------------------------------------------------------------------
28 // It is a reconstruction of the cipher engine used in iClass, and RFID techology.
30 // The implementation is based on the work performed by
31 // Flavio D. Garcia, Gerhard de Koning Gans, Roel Verdult and
32 // Milosch Meriac in the paper "Dismantling IClass".
33 //-----------------------------------------------------------------------------
34 #ifndef IKEYS_H
35 #define IKEYS_H
37 #include <inttypes.h>
39 /**
40 * @brief
41 *Definition 11. Let the function hash0 : F 82 × F 82 × (F 62 ) 8 → (F 82 ) 8 be defined as
42 * hash0(x, y, z [0] . . . z [7] ) = k [0] . . . k [7] where
43 * z'[i] = (z[i] mod (63-i)) + i i = 0...3
44 * z'[i+4] = (z[i+4] mod (64-i)) + i i = 0...3
45 * ẑ = check(z');
46 * @param c
47 * @param k this is where the diversified key is put (should be 8 bytes)
48 * @return
50 void hash0(uint64_t c, uint8_t k[8]);
51 /**
52 * @brief Performs Elite-class key diversification
53 * @param csn
54 * @param key
55 * @param div_key
58 void diversifyKey(uint8_t *csn, uint8_t *key, uint8_t *div_key);
59 /**
60 * @brief Permutes a key from standard NIST format to Iclass specific format
61 * @param key
62 * @param dest
65 #endif // IKEYS_H