-
Notifications
You must be signed in to change notification settings - Fork 24
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Integrated Oscilloscope in TNC640 #49
Comments
@Md-aliy7 no, I haven't been able to make any progress in decoding the data. I will try your recommendation but I don't have any experience in using these LLM's. Still, it is worth a shot. |
I am also trying to figure out how it was encrypted. |
NOTE: Not all of what I wrote here is correct for 100%, I am just trying to figure out how the data changes. -) From what I could notice, (Considering we have added more than one channel to read different data parameters -I still need to investigate it more-) -) For any nominal position channel data: The bytes numbers (3,4,5,6,7,8,9,10) seem to be randomly assigned such that if the value reading does not change, they will not change. If the value reading changes, they repeat themselves each 5 or near number of readings, regardless of the value reading. -) For any nominal velocity channel data: -) The next part is correct for nominal and actual (position & velocity) channels data: -) In each packet, the transferred data starts after the first 36 bytes, i.e., from the 37th byte. -) Different from iTNC530 whose packets contain 32 readings for any data collected from the channels, |
Investigation.zip |
Thanks for the data and your research so far. I also found some of the relations you mentioned. At least the encrypted data isn't compressed or anything. The package header (S_OD in this case) isn't encrypted and the length of the data also matches what is expected. The data on the other hand is encrypted. |
I am considering asking some cryptography experts from freelance websites. If I am correct, this is a description of the problems we have: (If you are an expert in cryptography, Wireshark, and computer networks, I will supply you with some network packets. The payload is encrypted and we have the decrypted numerical data. Your work is to find the encryption method used and prove it's the right one by testing other data we already have.) |
A professional will probably have more success than us poking around in the dark. You might also add that one part of the key is the date as well as a secret key sent by the control. One thing that makes me a bit worried is the current story between Nintendo and the folks of the dolphin emulator. I don't want to get into any trouble with Heidenhain for including the encryption stuff directly into pyLSV2. I am trying to think of a way on how the actually en/decryption code is part of the user application while the library only offers some way to plug in these functions. I will think about how this might be achievable... |
Hi,
Commenting on that quoted part in one of your replies:
Did you find any way to decrypt the data in TNC640?
Could you try any AI assistance like Chatgpt, google bard, or Microsoft Bing AI?
Probably one of them may help.
The text was updated successfully, but these errors were encountered: