Magtek MagneSafe V5 Reference Manual page 117

Table of Contents

Advertisement

; Build a Deactivate Authenticated Mode command (cmd, len, cryptogram)
;
12 08 XXXXXXXXXXXXXXXX
;
;
The clear text input for the cryptogram is composed of the first seven bytes
;
of the decrypted Challenge 2 followed by one byte specifying whether to
;
increment the DUKPT KSN or not (00 = no increment, 01 = increment).
;
;
DDDDDDDDDDDDDD II
;
;
These fields are concatenated to form an eight byte block, we will specify
;
No Increment:
;
;
DDDDDDDDDDDDDD00
;
;
The block is encrypted using a variant of the Current Encryption Key
;
(Current Encryption Key XOR with 3C3C3C3C3C3C3C3C3C3C3C3C3C3C3C3C)
;
;
Current Key
;
XOR
;
=
;
;
34DB923069828100 TDES Enc with 31CFE57E16F66A26 7B5B513B91579139 = CA CB BD 5F 58
D5 C9 50
;
; Send the Deactivate Authenticated Mode command
12 08 CACBBD5F58D5C950
Example 11: Swipe decryption, HID Reader in Security Level 3 or 4:
This example shows the data received in a HID report for a reader at Security
Level 3, KSN Count = 8.
data received.
Raw HID Report:
Byte
Content
0
00 00 00 40 28 20 00 C2 5C 1D 11 97 D3 1C AA 87 28 5D 59 A8
20
92 04 74 26 D9 18 2E C1 13 53 C0 51 AD D6 D0 F0 72 A6 CB 34
40
36 56 0B 30 71 FC 1F D1 1D 9F 7E 74 88 67 42 D9 BE E0 CF D1
60
EA 10 64 C2 13 BB 55 27 8B 2F 12 00 00 00 00 00 00 00 00 00
80
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
100
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 72
120
4C 5D B7 D6 F9 01 C7 F0 FE AE 79 08 80 10 93 B3 DB FE 51 CC
140
F6 D4 83 E7 89 D7 D2 C0 07 D5 39 49 9B AA DC C8 D1 6C A2 00
160
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
180
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
200
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
220
00 00 00 00 00 00 00 00 00 00 00 76 BB 01 3C 0D FD 81 95 F1
240
6F 2F BC 50 A3 51 71 AA 37 01 31 F8 74 42 31 3E E3 64 57 B8
260
7C 87 F9 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
280
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
300
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
320
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
340
00 00 00 00 A1 05 00 00 38 47 03 57 6B C5 C2 CB 20 BC 04 C6
360
8B 5C E1 97 2A E8 9E 08 7B 1C 4D 47 D5 D0 E3 17 06 10 69 03
380
E6 0B 82 03 07 92 69 0A 57 1D B0 2D 0A 88 85 5A 35 AB B5 54
400
97 98 00 6B 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
420
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
440
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
460
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0DF3D9422ACA561A 47676D07AD6BAD05
3C3C3C3C3C3C3C3C 3C3C3C3C3C3C3C3C
31CFE57E16F66A26 7B5B513B91579139
It will go on to show the steps to decrypt ALL the
Appendix D. Command Examples
109

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the MagneSafe V5 and is the answer not in the manual?

Table of Contents