IC decryption is a technical means aimed at cracking and restoring key information such as programme code of a chip or microcontroller encrypted by a vendor for reuse, imitation, etc. IC decryption technology has a wide range of applications, and is used in important applications in the fields of communications, cryptography, information security, electronic products, and so on.
Microcontroller decryption is also called microcontroller crack, chip decryption, IC decryption, but this is strictly speaking these kinds of designation are not scientific, but has become the habit of calling, we will CPLD decryption, DSP decryption are used to call microcontroller decryption. Microcontroller is just one of the classes of chips that can be loaded with programmes.
Currently, the chip decryption has the following aspects: replica of other people's circuits, decryption of the chip to get people to do the same procedure, you can do with others the same electronic products. Get some confidential algorithms, the purpose with 1 is also similar, is more advanced rehash.
The customary name of chip cracking is microcontroller decryption, microcontroller crack, chip decryption, in addition to IC decryption, the CPLD decryption, DSP decryption are accustomed to be called chip cracking. Chip crack is to achieve the copy of electronic products.
The general programmer is able to read out the programme inside the chip, but this is generally in the case of the chip is not encrypted. But similar to the macrochip programmer, there is no readable function, which is the decryption of the work to bring very great resistance.
Decryption with soft decryption technology. stc microcontroller encryption is mainly achieved by encrypting the user's code before downloading, in order to prevent the code from being intercepted by the third-party serial port monitoring software in the process of downloading the user's original code data, thus ensuring the security of the code.
Single chip decryption is a very loaded thing, the first need to oxidise the chip's encapsulated surface layer, and decrypt it with professional equipment. The first is to completely dissolve off the chip package, exposing the metal connecting wires. It is necessary to bind the chip to the test fixture and operate it with the help of a binding table. The second is to remove only the plastic package on top of the silicon core.
The chip will be added to the chip's programme chip protection procedures, EMXXX such as pin 2 voltage input will be cleared of all the contents of the chip... ; 6: It is better to use a bare chip for the product; 7: Fuse some ports with high current ....
The attacker took advantage of the loophole in the design of the timing of the erase operation of this series of microcontrollers, using a self-programmed program to stop the next step of erasing the data of the on-chip program memory after erasing the encryption lock locus, thus turning the encrypted microcontroller into an unencrypted microcontroller, and then using a programmer to read out the on-chip program.
This process is generally carried out under very dry conditions, as the presence of water can erode exposed aluminium wire connections (which can cause decryption failures). The chip is then washed first with acetone in an ultrasonic bath to remove residual nitric acid and soaked.
We make the following recommendations based on Husheng's decryption practice: (1) Before selecting an encryption chip, conduct sufficient research to understand new advances in microcontroller cracking technology, including which microcontrollers have been confirmed to be crackable.
1. The microcontroller, also called a chip, has a programme in it. The programme in the chip is encrypted and generally unreadable. But it can be cracked. There is encryption, there is decryption. Want to decrypt the hand of the MCU, as long as the Baidu input "chip decryption" can be found in the company specialising in modchip.
2, chip decryption methods are mainly three: software decryption, hardware decryption and side channel attack. First of all, software decryption is a method to achieve decryption by analysing the internal software algorithm and logical structure of the chip.
3, you can encrypt the compiled program through the software, and then through the system initialisation after the decryption program in the internal ram on the code for dynamic decryption of the code to perform, this idea is the IBM server encryption ideas.
4. The first method requires the chip to be bound to the test fixture, with the help of the binding station to operate. The second method in addition to the need to have the attacker a certain knowledge and the necessary skills, but also need personal wisdom and patience, but the operation is relatively convenient, completely home in the operation.
5. The inserted bytes are able to execute the instruction to send the on-chip programme to the off-chip, and then intercepted with the decryption device, so that the programme inside the chip is decrypted and finished.
1, buy and sell illegal, belonging to the crime of illegal business, which clearly stipulates that the commission of this crime, shall be sentenced to less than five years of fixed-term imprisonment or detention, and or a single fine; the circumstances are particularly serious, shall be sentenced to more than five years of fixed-term imprisonment, and a fine or confiscation of property.
2, Huaqiang North speculation chip why will not be arrested because there is no violation of the provisions of the law.
3, not illegal. It's just more trouble and more money. Now most of the low-end chips in China have mass production, but more high-end, or need to import, so must be purchased from overseas, such as Samsung's chips, TSMC chips, etc., are indispensable things on the mobile phone.