PLD: Difference between revisions

From Proghq
Jump to navigation Jump to search
No edit summary
No edit summary
Line 3: Line 3:
* http://proghq.org/wiki/User:Robertbaruch
* http://proghq.org/wiki/User:Robertbaruch


Cracker
= Brute force cracker =
*****************


test
A common technique for recovering protected contents is iterating over all input permutations and observing output permutations. However, this only works well for PLDs with only combintorial logic (ie no FFs).
 
Example projects include:
* Arduino based: http://www.jammarcade.net/arduino-pal-cracker/
* The method used was identical to the way Charles MacDonald’s device worked so to keep compatibility with his analyser program. I don’t really require the ‘dumping’ feature of this as I use the hardware from Charles and its a lot faster to use but this option is there if I ever need it.
* Charles MacDonald: was this published?
* brizzo may have something
* kevtris may have something

Revision as of 23:04, 5 September 2018

ATF22V10C

Brute force cracker

A common technique for recovering protected contents is iterating over all input permutations and observing output permutations. However, this only works well for PLDs with only combintorial logic (ie no FFs).

Example projects include:

* The method used was identical to the way Charles MacDonald’s device worked so to keep compatibility with his analyser program. I don’t really require the ‘dumping’ feature of this as I use the hardware from Charles and its a lot faster to use but this option is there if I ever need it.
  • Charles MacDonald: was this published?
  • brizzo may have something
  • kevtris may have something