Skip to content

X-Stuff/CudaKeeloq

Repository files navigation

Intro

This is a CUDA accelerated simple bruteforcer of KeeLoq algorithm.

Disclaimer

64-bit keeloq key is 18,446,744,073,709,551,615 possible combinations. EVEN! if your GPU will be able to calculate 1 billion keys in a second. You will need 18446744073709551615 / 1000000000 / 3600 / 24 / 365 = 584 YEARS! to brute a single key. My laptop 3080Ti can do only 230 MKeys/s So it's practically impossible to use this application "as is" in real life attack.

Version history

  • 0.1.2
    • Fixed dockerfile, added CMD (issue: #4).
    • CUDA version updated to `12.2``
  • 0.1.1
    • Added seed bruteforce mode (issue: #2).
    • Added support of specifying seed in a text dictionaries.
    • Fixed some minor bugs and internal refactoring.
    • Slightly improved performance (1-5%)
  • 0.1.0
    • Initial public release.

Capabilities

  • Simple (+1) bruteforce

    Regular straightforward bruteforce where keys just incremented +1

  • Filtered (+1) bruteforce

    Some basics filters for simple bruteforce, like "keys with more that 6 subsequent zeros". Filters may apply to Include and/or Exclude rules. e.g. you can exclude keys with all ASCII symbols. You may also use Include filter but its performance is incredibly bad, so I don't recommend this attack type at all.

  • Alphabet attack

    You may specify exact set of bytes which should be used for generating keys during bruteforce. For example you may want to use only numbers, or only ascii symbols.

  • Pattern attack

    This is like extended alphabet. You may specify individual set of bytes for each byte in 64bit key. For example you may want first byte be any value, but others be only numbers.

  • Dictionary attack

    Manufacturer keys will be taken from input files. Supports binary and text modes. In text mode it's allowed to specify a seed also.

Limitations

  • Doesn't support mixed bruteforce mode, when you need to bruteforce keys and seeds. You have to specify either seed or key if you want to brute secure or faac types.
  • Can't do binary dictionary window attack. If you want something similar, you can make 63 more files. Where each file's content will be shifted by 1-to-63 bit to the left.

Build

Windows

Requirements

  • CUDA Toolkit v12.2.0

    • nvcc
    • cuda runtime
    • visual studio extension
  • Microsoft Visual Studio 2022

Compiling

Just open .vcxproj file and build it

Linux

Requirements

Compiling

$ ./build.sh

This will create a container cudakeeloq:local with compiled app

Run the bruteforcer

$ ./run.sh <ARGS>

NOTE: You may need to have CUDA docker extension installed in order to have --gpus command line argument works.

Different CUDA Version

Windows

Open .vcxproj find and replace:

  • CUDA 12.2.targets with desired version
  • CUDA 12.2.props with disired version

Linux

Open dockerfile and change CUDA_MAJOR, CUDA_MINOR and CUDA_PATCH variables

Run

Requirements

  • NVidia GPU (1GB+ RAM)
  • RAM 1GB+
  • (Linux only) installed CUDA docker extension nvidia-container-toolkit

Examples

Simple bruteforce

./CudaKeeloq --inputs xx,yy,zz --mode=1 --start=0x9876543210 --count=1000000
  • bruteforce of 1 million keys starting from 0x9876543210

Alphabet bruteforce

./CudaKeeloq --inputs xx,yy,zz --mode=3 --learning-type=0 --alphabet=examples/alphabet.bin,10:20:30:AA:BB:CC:DD:EE:FF:02:33

Specified 2 alphabets - 2 attacks will be launched:

  • First will use file examples/alphabet.bin as alphabet source.
  • Second alphabet is provided via command line 10:20:30:AA:BB:CC:DD:EE:FF:02:33

Pattern bruteforce

./CudaKeeloq --inputs xx,yy,zz --mode=4 --pattern=FF:11:*:*:AA-FF:01|10:00:FF,*:*:*:*:AB:CD:EF:00

Specified 2 patterns - 2 attacks will be launched:

  • First will check keys started (less significant bytes) from ..00FF, then will be either 01 or 10 bytes, then bytes range AA, AB, AC, AD ... FF, then 2 any bytes [0x00:0xFF], and final 2 bytes will be 11 and FF.
  • Second has constant lower 32 bit value ABCDEF00 and higher 32 bits will be bruted.

Seed bruteforce

./CudaKeeloq --inputs xx,yy,zz --mode=5 --start=<man>

This will launch seed attack with specified manufacturer key: <man>. If --learning-type= not specified - will try to check all learning types with seed - FAAC and Secure ( Rev version dropped intentionally since manufacturer key explicitly set ). You can specify start seed with --seed= but it's kind of useless. Check all 32-bit values is matter of minutes, and check will be forced to do all over the uint32 range anyway.

Dictionary bruteforce

./CudaKeeloq --inputs xx,yy,zz --mode=0 --word-dict=0xFDE4531BBACAD12,examples/dictionary.words --bin-dict=examples/dictionary.bin --bin-dict-mode=1

This will launch 2 dictionary attacks:

  1. Explicit key 0xFDE4531BBACAD12 from command line and parsed keys from examples/dictionary.words
  2. Keys created from bytes of file examples/dictionary.bin. Since --bin-dict-mode=1 specified, read 8-bytes from file will be reversed. So the bytes 01 00 00 00 ... will become uint64 number with value 1.

Other arguments for this mode aren't used.

Command line arguments

Inputs

  • --inputs=[i1, i2, i3] - inputs are captured "over the air" bytes, you need to provide 1-3 in format of hexadecimal number: 0x1122334455667788.

    NOTE: It is possible to launch bruteforce over the single captured data, but there will be tons of false matches. You shouldn't use it. Even with 2 inputs chances are pretty high.

Bruteforce range

  • --start=<value> - defines the initial value from which bruteforce begins. Applies to all types except dictionary ( default is 0 ). For alphabet or pattern types, should be specified value which can be converted to pattern or alphabet. e.g. if you use alphabet 77:88:FF:AA:BB and specify --start=0x778899FFAABBAABB - bruteforce will start from 0x778877FFAABBAABB since 99 is not exist in alphabet it will be replace with the first byte in alphabet. If you specify 0 as start value bruteforce will start from 0x77777...

  • --count=<value> - number of keys to generate and check ( default is uint64 max - means all ). If you using simple +1 mode it will define the last key to check. In other mode determine the last key might be not trivial task.

  • --seed=<value> - seed value. It used only in SECURE and FAAC learning modes. Providing seed without a learning mode will just significantly reduce bruteforce speed. If you definitely know that captured data encrypted with seed'ed algorithm - specify --learning-type=4,5,8,9 (SECURE and FAAC both with _rev variation), no sense in that case to calculate the others. And vice versa, if you don't know the seed - do not specify it, otherwise - useless calculation would be done. Not supported in dictionary mode.

Modes

In case of single input - the match check will be done only by match 18-bits of serial. Keeloq OTA packet divided into 2 parts fix and hop.

  • fix - 4-bit encoded button and 28-bit serial number of transmitter
  • hop - encoded serial, button and counter So in single mode decoded serial will be matched to stripped serial from fix part. This is not accurate and gives you tons of phantoms.

In case of normal inputs (2-3) - the analysis will be slightly more complex.

  • All inputs will be decode with same key
  • All decoded coded hop parts will be compared by serial
    • if serial match - then will be checked button - button should be the same
    • if button match - then will be checked counter - is should be increasing per each input

3 inputs is enough to eliminate phantoms no need to provide more (however there is still a possibility to catch one).

2 inputs might give you less accurate results with phantoms.

Obviously single mode is 3-4x times faster than normal due to optimizations. However results in single mode might not be accurate.

Capture

The idea of normal flow is:

  • Setup your radio capture device.
  • Click same button 3 times on your transmitter (same serial, same button, increasing counter).
  • Convert encoded signal to bytes.
  • Provide these bytes as inputs.

CUDA Setup

  • --cuda-blocks=N - N is a number of thread blocks for each bruteforce attack round
  • --cuda-threads=N - N is a number of CUDA threads for each block (above). If 0 (default) - the maximum from device caps will be set.

Overall number of threads is multiplication of cuda-blocks and cuda-threads.

Keep in mind that the more overall threads you will have - the more memory they will consume. (e.g. 8196 and 1024 consumes approx. 2.5 GB RAM (and GPU RAM))

Attack modes

Each bruteforce run must define a mode. Several modes can be specified at the same time like --mode=0,1,3,4 but you should provide all expected arguments for each mode.

  • --mode=0 - Dictionary. Expects (one or both):
    • --word-dict=[f1, w1, ...] - f1 - text dictionary file(s) with hexadecimal values, w1 hexadecimal word itself. Supports seed also, should be provided with : as delimiter (e.g.: 0xAABBCCDDEE:1234) and as decimal number only.
    • --bin-dict=[f1, f2] - binary file(s) each 8 bytes of which will be used as dictionary word. Supports --bin-dict-mode=M where M = { 0, 1, 2}. 0 - as is (big endian). 1 - reverse (little endian), 2 - both.
  • --mode=1 - Simple bruteforce mode.
    • --start defines the first key from which bruteforce begins.
    • --count how much keys to check.
  • --mode=2 - Filtered bruteforce mode. Same as simple, but with filters:
    • --exclude-filter=V where V is number representing filers flags combinations. (see: bruteforce_filters.h)
    • --include-filter=V (same as above)
  • --mode=3 - Alphabet mode. Expects:
    • --alphabet=[f1, a1, ...] - where f1 is a binary file contents of which will be interpreted as allowed bytes in key during bruteforce. where a1 is : separated hex string of bytes in alphabet (like: AA:BB:01)
    • Also allowed to use --start and --count arguments, with same meaning
  • --mode=4 - Pattern mode. Expects:
    • --pattern=[f1, p1, ...] - where f1 is a text file with hexadecimal pattern, and p1 is : separated hexadecimal pattern like *:aa:00-33:0xF3|0x11:AL0 ....
      • * - means any byte
      • 0xNN-0xMM - means range from 0xNN to 0xMM
      • A|B|C - means A or B or C
      • AL[0..N] - means alphabet from inputs (must be specified with --alphabet=)
    • --alphabet= - if pattern has AL - alphabet must be specified.
  • --mode=5 - Seed bruteforce mode. Expects:
    • --start=<man> - Manufacturer key. This will be the only key to check. Instead of bruteforcing keys, this mode bruteforce seeds.

Learning types

By default the app will try to brute all known learning keys (16 or 12 depending if seed is specified), however if you know exact learning type, you might increase you bruteforce time x12-16 times. You may also specify several learning types simultaneously --learning-type=0,5,7.

NOTE: Depending on your GPU, at some point, using ALL learning types might be faster than explicitly specified, due to the GPU branching problem.

Each learning type has its _REV modification. That's mean it will use byte-reversed key for decryption. See more keeloq_learning_types.h

Here and below =x[y] - x value for normal mode, y for reversed.

  • --learning-type=0[1] - Simple learning
  • --learning-type=2[3] - Normal learning
  • --learning-type=4[5] - Secure learning (requires seed)
  • --learning-type=6[7] - XOR learning
  • --learning-type=8[9] - FAAC learning (requires seed)
  • --learning-type=10[11] - UNKNOWN TYPE1
  • --learning-type=12[13] - UNKNOWN TYPE2
  • --learning-type=14[15] - UNKNOWN TYPE3

Miscellaneous

  • --first-match - if true (default) will stop all bruteforce on first match
  • --test - launches internal debug tests (useful mostly if built in Debug configuration)
  • --benchmark - launches CUDA setup benchmark. Will show comparison of different CUDA setup (block and threads).
  • --help, -h - prints help

Performance

Windows executable, release mode, MSVS 2022, CUDA 12.0.0

For my laptop's GPU ( 3080Ti ) the best results with 8196 CUDA Blocks and maximum CUDA threads (from device info - 1024) - it gives me approx.:

  • 28 MKeys/s for ALL learning types if seed is specified.
  • 49 MKeys/s for ALL learning types if seed is not provided.
  • 500 MKeys for Simple ( the easiest type single keeloq decryption ).
  • 250 MKeys for Normal and Secure.
  • 220 MKeys for FAAC.