https://github.com/stef/px1000cr
Files related to PoC||GTFO 21:21 - NSA’s Backdoor of the PX1000-Cr
https://github.com/stef/px1000cr
backdoor cryptanalysis crypto historical lfsr nsa px1000 px1000cr reverse-engineering
Last synced: 11 months ago
JSON representation
Files related to PoC||GTFO 21:21 - NSA’s Backdoor of the PX1000-Cr
- Host: GitHub
- URL: https://github.com/stef/px1000cr
- Owner: stef
- License: gpl-3.0
- Created: 2022-02-16T15:09:09.000Z (about 4 years ago)
- Default Branch: master
- Last Pushed: 2022-03-23T23:25:24.000Z (almost 4 years ago)
- Last Synced: 2025-04-16T00:09:54.415Z (11 months ago)
- Topics: backdoor, cryptanalysis, crypto, historical, lfsr, nsa, px1000, px1000cr, reverse-engineering
- Language: Python
- Homepage:
- Size: 3.79 MB
- Stars: 16
- Watchers: 3
- Forks: 0
- Open Issues: 1
-
Metadata Files:
- Readme: readme.md
- License: LICENSE
Awesome Lists containing this project
README
* Files related to PoC||GTFO 21:21 - NSA’s Backdoor of the PX1000-Cr
```
64bit2key.py - tool taking a key, returning possible 16 byte password
PX1000_EPROM.map - the memory map of the px1000cr
PX1000_EPROM.s19 - the px1000cr ROM in s19 format - for the simulator
PX1000_EPROM.sim - startup script for the simulator
anf.jpg - the formula for the ANF from A. Joux' tome
angr_tgt.c - a synthesized LFSR implementation for angr
angr_tgt.py - angr script to extract constraints for the LFSR
blockschema.svg - the blockschema made by the Crypto Museum people
core.[ch] - encryption implementation
decrypt.c - a decrypt tool based on core.[ch]
docs/ - various docs that contributed to the attack
encrypt.c - an encrypt tool based on core.[ch]
f-anf.py - construct, verify and output the ANF of F
lfsr-next-bits.py - analyze the dependency graph of the LFSR bits
lfsr-next-bits.txt - the LFSR bit dependency graph
lfsr.c - c implementation of the four LFSRs
lfsr.jpg - the LFSR diagram
lfsr32.py - extracting the four LFSRs from the lookupTable
moebius.c - calculate the Möbius transform of F
moebius4.py - calculate the Möbius and ANF of the 4-to-4 mapping
px1000.jpg - an image of the PX1000cr
px1k-claripy.py - the final attack
px1kcr.c - the most literal c implementation of the EPROM
readme.md - this file
utils.[ch] - various debug and experimental functions
writeup.txt - the writeup
```