jeudi 30 mai 2019

Simple method to reverse engineer a PRNG?

I have a pseudo random binary sequence that I'd like to reverse engineer. It's being generated by a radio IC that I need to communicate with so is almost certainly an LFSR of some description. I'd like to work out the seed and polynomial used.

Is there a simple method?

The sequence is 8-bit numbers and it repeats every 127 bytes.

Here's the full 127 byte sequence:

0x32,0x20,0x49,0xA7,0xB8,0x7F,0x1D,0x8A,0x5F,0x54,0x2D,0xE7,0x2B,0x30,0x6D,0x74,0x64,0x40,0x93,0x4F,0x70,0xFE,0x3B,0x14,0xBE,0xA8,0x5B,0xCE,0x56,0x60,0xDA,0xE8,0xC8,0x81,0x26,0x9E,0xE1,0xFC,0x76,0x29,0x7D,0x50,0xB7,0x9C,0xAC,0xC1,0xB5,0xD1,0x91,0x02,0x4D,0x3D,0xC3,0xF8,0xEC,0x52,0xFA,0xA1,0x6F,0x39,0x59,0x83,0x6B,0xA3,0x22,0x04,0x9A,0x7B,0x87,0xF1,0xD8,0xA5,0xF5,0x42,0xDE,0x72,0xB3,0x06,0xD7,0x46,0x44,0x09,0x34,0xF7,0x0F,0xE3,0xB1,0x4B,0xEA,0x85,0xBC,0xE5,0x66,0x0D,0xAE,0x8C,0x88,0x12,0x69,0xEE,0x1F,0xC7,0x62,0x97,0xD5,0x0B,0x79,0xCA,0xCC,0x1B,0x5D,0x19,0x10,0x24,0xD3,0xDC,0x3F,0x8E,0xC5,0x2F,0xAA,0x16,0xF3,0x95,0x98,0x36,0xBA




Aucun commentaire:

Enregistrer un commentaire