Arris InternationalĪrris International Plc is a British telecommunications equipment manufacturing company incorporated in England and Wales that provides cable operators with data, video and telephony systems for homes and businesses. Ģ2 relations: Arris International, Cable television, Communications satellite, Data compression, Digital cable, Digital Video Broadcasting, Dolby Digital, Encryption, General Instrument, Google, Huffman coding, Metadata, Motorola, PrimeStar, Program and System Information Protocol, Satellite television, Set-top box, Shaw Direct, Television, Tuner (radio), Virtual channel, 4DTV. You don't even know which algorithm is used to encrypt,along with the missing master keysīut the principle is simple : use the unit id as a variable to encrypt the message,use the same unit id as a variable to decrypt the message.DigiCipher 2, or simply DCII, is a proprietary standard format of digital signal transmission and it doubles as an encryption standard with MPEG-2/MPEG-4 signal video compression used on many communications satellite television and audio signals. If there is a relation between the master key they use to encrypt their messages with the one that decrypts,you will never know,because the encryption/decyption system is not reversible.
#Hack digicipher 2 on zgemma how to#
They also know how to generate and encrypt every message for any receiver in their database. In principle,the provider knows EVERYTHING. Reason why only the provider can reprogram the eeprom,only them have this information
There are different reasons for one to write to those areas,one would be to clone a receiver using the same unit ID and keys,given you extracted those from original IRD.Īnd in case the keys are the same in all receivers,you could make a clone from any IRD.Īs the battery keep the eeprom memory alive,the lost of unit ID when battery fails would also lose the keys too. I read the same as you : keys and unit ID are in the receiver from factory. Too much thinking,some things right,some things wrong. Of course, I may be wrong and perhaps completely misunderstanding the process.
Granted that relationship might be complex and difficult to figure out. So, the question is how does the provider know what keys to encrypt the packets they are sending to your receiver which will contain the keys to unlocking their services? That's the reason I was thinking there must exist some relationship between the unit ID and the seed keys. The seed keys are in the ram and aren't accessible unless you do the kind of glitching this guy did. When you subscribe to a Digicipher II service, all you give them is the unit ID number. What I was thinking was that if the 3 seed keys are used to decrypt the keys that are sent down the stream to the particular unit, the providers must somehow know what keys to use to encrypt those keys and they must encrypt it with keys that will allow the 3 seed keys to get the right result. Yes, but does there have to be a relationship of some sort between the 2 keys? If that's the case, doesn't that mean the 3 seed keys are in the receiver when it leaves the factory and remain the same for the entire life of the receiver? I do know that when the battery goes dead in one these receivers the message you get is something about a "bad seed key".Īnother mistake you make : in any encryption system,the key used to encrypt the packets is not the same key that decrypts it. However, in the video I interpreted him to say that the Unit ID and the three seed keys were programmed in the receiver from the factory and that any attempt to write to those location resulted in the processor resetting itself. I admit that I'm not an expert in this field like you guys. Perhaps, I'm mistaken and misunderstanding something here. It could be,but can also be a way to generate the packet intended for this unit,and not related to it. Why would it be the key derived from the Unit ID?