![]() ![]() > Was there another, pre-1998 French second permutation table? So if bit 3 is a selection of permutation tables, my decoder seems not to be updated to table phase 2. * I tried to inject the French permutation table phase 2 in syster.c (the one that +/- kept the SECAM color line order, starting 1998), to see if it would work better with bit 3. * it doesn't look like a field-repeated "s,r" mode, where each field uses the same "s,r" list * with legacy permutation table, if enabled, then on my decoder, it seems part of the image is decrypted, part of the image is not. vbi bit 5: seems to ask for video decryption or not (unencrypted) vbi bit 4: if 1, inverts audio at 12.8kHz, else ? KHz if 0 Is it selecting another permutation table? vbi bit 3 seems to say: if enc is nagravision, s,r are different. vbi bits 0-1 choose encryption mode 1: d11, 2: nagra, 0:?, 3:? ![]() Hoping to potentially recreate it with Videocrypt though. Would be great to actually have it working on a real decoder but without access to one, it will be tricky. Top image is the encrypted transmission from HackRF and bottom is the decrypted one. Getting close for Sats UK's own channel - subscription only £99.99 per month As a result, the top part of the image is still encrypted but is still very watchable. The decoder then rearranges that into a single frame through the use of buffers. it worked! It's not 100% decryption (or rather encryption) as I am only encrypting a single frame at a time, whereas in a real encoder, the top 32 lines (or 64 counting odd and even fields) from the previous frame are shifted to the bottom of the existing frame. Ran the encrypted (in real time) stream through HackRF and captured it with a capture card through the likes of MoreTV and. This is because the line shuffling that I was doing was completely random, whereas software decoders relied on a real known substitution table along with initial trial-and-error line comparison to find two randomly generated values at the encoder end.įollowing the document here, along with some source codes available elsewhere, I managed to recreate a semi-working encoder, which follows the steps of the real one - using the substitution table. ![]() Having tried various software Nagravision descramblers, I found that none at all were even thinking about decoding it. Splitting off from the MAC resurrection thread where there was a short of Videocrypt and Nagravision encryption, I thought it would be a good idea to actually decrypt the transmission! ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
January 2023
Categories |