First thank you very mutch for your help
When i change gpi i can add it on nuvi or must be first encrypted back?
Works just as it is, no unlocking needed !
The difference between stupidity and genius is that genius has its limits.
Albert Einstein.
What are you changing?
it seemed to me that 3 things should be done:
1. autochange every <hr>SK to <hr>XX
2. autochange every <hr>SL to <hr>SK
3. autochange every <hr>XX to <hr>SL
Something occurred to be more complicated?
As for the encryption by repetitive special_adding of the fixed double word.. it's strong!![]()
48 06 B3 00
i called these 4 bytes - a double word. It is the same for "encrypting" all the file tail (starting at pos 312h = 786 decimal)
"special_adding" is as follows:
Let's take a byte @312h: namely 09
Let's add the first syllable of 09 (0) with the the first syllable of 48 (4) - resulting in 4, LSbits of the sum will be the first syllable of "ecrypted" byte
Let's add the second syllable of 09 (9) with the the second syllable of 48 (8) - resulting in 11, LSbits of the sum will be the second syllable of "ecrypted" byte
So "encrypted" byte @312h is 41
Let's take a byte @313h: namely 00
Let's add the first syllable of 00 (0) with the the first syllable of 06 (0) - resulting in 0, LSbits of the sum will be the first syllable of "ecrypted" byte
Let's add the second syllable of 00 (0) with the the second syllable of 06 (6) - resulting in 6, LSbits of the sum will be the second syllable of "ecrypted" byte
So "encrypted" byte @313h is 06
Let's take a byte @314h: namely 08
Let's add the first syllable of 08 (0) with the the first syllable of B3 (B) - resulting in B, LSbits of the sum will be the first syllable of "ecrypted" byte
Let's add the second syllable of 08 (8) with the the second syllable of B3 (3) - resulting in B, LSbits of the sum will be the second syllable of "ecrypted" byte
So "encrypted" byte @314h is BB
Let's take a byte @315h: namely - we don't care due to the corresponding byte of our dword is 00 - special_addition with 00 doesn't change the other argument
So "encrypted" byte @315h is the sameas in the non-encrypted file (ahh.. 00 - we are lucky!)
Let's take a byte @316h: namely 3A
Let's add the first syllable of 3A (3) with the the first syllable of 48 (4) - resulting in 7, LSbits of the sum will be the first syllable of "ecrypted" byte
Let's add the second syllable of 3A (A) with the the second syllable of 48 (8) - resulting in 12, LSbits of the sum will be the second syllable of "ecrypted" byte
So "encrypted" byte @316h is 72
and so on
i can write one unique formula, but cannot decide which bit/byte-operation functions are well-known to the readers.
In fact it is sufficient to use chr(), asc() and mod(,16)
The difference between stupidity and genius is that genius has its limits.
Albert Einstein.




OK! You are genius! I have tried to do simple subtraction for each whole byte from key:
48 06 B3 00
but I always got some random wrong decrypted byte as say above. It had entered me to a screeching halt!!! The key was obvious after comparing of two simple and very small file that was made by GPICreator - one is encrypted and second is non-encrypted. Script for HEX editor worked fine. But always just a little broken result was on screen.
It is pity what HEX editor is not operable with this algorithm. I am a deep stupid. So hope to you or may be syzygy give a ready for use program decision...
Last edited by Giomen; 29th June 2013 at 02:17 AM.
Garmin, how much is 30 pieces of silver for Judas today? Were they worthy for crucifix of GPSPower?
Bookmarks