summaryrefslogtreecommitdiff
path: root/plugins/ao/eng_qsf/kabuki.c
diff options
context:
space:
mode:
authorGravatar Alexey Yakovenko <wakeroid@gmail.com>2010-06-22 22:26:45 +0200
committerGravatar Alexey Yakovenko <wakeroid@gmail.com>2010-06-22 22:26:45 +0200
commit20575a338e9640eca924958484a5fee800e09971 (patch)
treeefaeac41a8a21bea1c90494b3b0968169d4f8732 /plugins/ao/eng_qsf/kabuki.c
parentc901a7cbf52ee234220f21b85c2e77667264d16c (diff)
audio overload plugin - highly experimental; no seeking; crashes
Diffstat (limited to 'plugins/ao/eng_qsf/kabuki.c')
-rw-r--r--plugins/ao/eng_qsf/kabuki.c156
1 files changed, 156 insertions, 0 deletions
diff --git a/plugins/ao/eng_qsf/kabuki.c b/plugins/ao/eng_qsf/kabuki.c
new file mode 100644
index 00000000..61100304
--- /dev/null
+++ b/plugins/ao/eng_qsf/kabuki.c
@@ -0,0 +1,156 @@
+/***************************************************************************
+
+"Kabuki" Z80 encryption
+
+
+The "Kabuki" is a custom Z80 module which runs encrypted code. The encryption
+key is stored in some battery-backed RAM, therefore the chip has the annoying
+habit of stopping working every few years, when the battery dies.
+Check at the bottom of this text to see a list of all the known games which
+use this chip.
+
+
+How it works:
+The base operation is a bit swap which affects couples of adjacent bits.
+Each of the 4 couples may or may not be swapped, depending on the address of
+the byte and on whether it is an opcode or data.
+The decryption consists of these steps:
+- bitswap
+- ROL
+- bitswap
+- XOR with a key
+- ROL
+- bitswap
+- ROL
+- bitswap
+
+To know how to apply the bit swap, take the address of the byte to decode and:
+- if the byte is an opcode, add addr_key to the address
+- if the byte is data, XOR the address with 1FC0, add 1, and then add addr_key
+You'll get a 16-bit word. The first two bitswaps depend on bits 0-7 of that
+word, while the second two on bits 8-15. When a bit in the word is 1, swap the
+two bits, oherwise don't. The exact couple of bits affected depends on the
+game and is identified in this file with two keys: swap_key1 and swap_key2
+(which are just permutations of the numbers 0-7, not full 32-bit integers).
+
+
+Key space size:
+- swap_key1 8! = 40320
+- swap_key2 8! = 40320
+- addr_key 2^16 = 65536
+- xor_key 2^8 = 256
+- total 2.7274 * 10^16
+
+
+Weaknesses:
+- 0x00 and 0xff, having all the bits set to the same value, are not affected
+ by bit permutations after the XOR. Therefore, their encryption is the same
+ regardless of the high 8 bits of the address, and of the value of
+ swap_key2. If there is a long stream of 0x00 or 0xff in the original data,
+ this can be used to find by brute force all the candidates for swap_key1,
+ xor_key, and for the low 8 bits of addr_key. This is a serious weakness
+ which dramatically reduces the security of the encryption.
+- A 0x00 is always encrypted as a byte with as many 1s as xor_key; a 0xff is
+ always encrypted as a byte with as many 0s as xor_key has 1s. So you just
+ need to know one 0x00 or 0xff in the unencrypted data to know how many 1s
+ there are in xor_key.
+- Once you have restricted the range for swap_key1 and you know the number of
+ 1s in the xor_key, you can easily use known plaintext attacks and brute
+ force to find the remaining keys. Long strings like THIS GAME IS FOR USE IN
+ and ABCDEFGHIJKLMNOPQRSTUVWXYZ can be found by comparing the number of 1s
+ in the clear and encrypted data, taking xor_key into account. When you have
+ found where the string is, use brute force to reduce the key space.
+
+
+Known games:
+ swap_key1 swap_key2 addr_key xor_key
+Mahjong Gakuen 2 Gakuen-chou no Fukushuu 76543210 01234567 aa55 a5
+Poker Ladies " " " " "" ""
+Dokaben " " " " "" ""
+Dokaben 2 unknown
+Pang / Buster Bros / Pomping World 01234567 76543210 6548 24
+Capcom Baseball " " " " "" ""
+Capcom World 04152637 40516273 5751 43
+Adventure Quiz 2 Hatena ? no Dai-Bouken 45670123 45670123 5751 43
+Super Pang 45670123 45670123 5852 43
+Super Buster Bros 45670123 45670123 2130 12
+Super Marukin-Ban 54321076 54321076 4854 4f
+Quiz Tonosama no Yabou 12345670 12345670 1111 11
+Ashita Tenki ni Naare unknown
+Quiz Sangokushi 23456701 23456701 1828 18
+Block Block 02461357 64207531 0002 01
+
+Warriors of Fate 01234567 54163072 5151 51
+Cadillacs and Dinosaurs 76543210 24601357 4343 43
+Punisher 67452103 75316024 2222 22
+Slam Masters 54321076 65432107 3131 19
+
+***************************************************************************/
+
+#include "cpuintrf.h"
+
+static int bitswap1(int src,int key,int sel)
+{
+ if (sel & (1 << ((key >> 0) & 7)))
+ src = (src & 0xfc) | ((src & 0x01) << 1) | ((src & 0x02) >> 1);
+ if (sel & (1 << ((key >> 4) & 7)))
+ src = (src & 0xf3) | ((src & 0x04) << 1) | ((src & 0x08) >> 1);
+ if (sel & (1 << ((key >> 8) & 7)))
+ src = (src & 0xcf) | ((src & 0x10) << 1) | ((src & 0x20) >> 1);
+ if (sel & (1 << ((key >>12) & 7)))
+ src = (src & 0x3f) | ((src & 0x40) << 1) | ((src & 0x80) >> 1);
+
+ return src;
+}
+
+static int bitswap2(int src,int key,int sel)
+{
+ if (sel & (1 << ((key >>12) & 7)))
+ src = (src & 0xfc) | ((src & 0x01) << 1) | ((src & 0x02) >> 1);
+ if (sel & (1 << ((key >> 8) & 7)))
+ src = (src & 0xf3) | ((src & 0x04) << 1) | ((src & 0x08) >> 1);
+ if (sel & (1 << ((key >> 4) & 7)))
+ src = (src & 0xcf) | ((src & 0x10) << 1) | ((src & 0x20) >> 1);
+ if (sel & (1 << ((key >> 0) & 7)))
+ src = (src & 0x3f) | ((src & 0x40) << 1) | ((src & 0x80) >> 1);
+
+ return src;
+}
+
+static int bytedecode(int src,int swap_key1,int swap_key2,int xor_key,int sel)
+{
+ src = bitswap1(src,swap_key1 & 0xffff,sel & 0xff);
+ src = ((src & 0x7f) << 1) | ((src & 0x80) >> 7);
+ src = bitswap2(src,swap_key1 >> 16,sel & 0xff);
+ src ^= xor_key;
+ src = ((src & 0x7f) << 1) | ((src & 0x80) >> 7);
+ src = bitswap2(src,swap_key2 & 0xffff,sel >> 8);
+ src = ((src & 0x7f) << 1) | ((src & 0x80) >> 7);
+ src = bitswap1(src,swap_key2 >> 16,sel >> 8);
+ return src;
+}
+
+static void kabuki_decode(unsigned char *src,unsigned char *dest_op,unsigned char *dest_data,
+ int base_addr,int length,int swap_key1,int swap_key2,int addr_key,int xor_key)
+{
+ int A;
+ int sel;
+
+ for (A = 0; A < length; A++)
+ {
+ /* decode opcodes */
+ sel = (A + base_addr) + addr_key;
+ dest_op[A] = bytedecode(src[A],swap_key1,swap_key2,xor_key,sel);
+
+ /* decode data */
+ sel = ((A + base_addr) ^ 0x1fc0) + addr_key + 1;
+ dest_data[A] = bytedecode(src[A],swap_key1,swap_key2,xor_key,sel);
+ }
+}
+
+void cps1_decode(unsigned char *rom, int swap_key1,int swap_key2,int addr_key,int xor_key)
+{
+ int diff = (512*1024)/2;
+
+ kabuki_decode(rom, rom+diff, rom, 0x0000, 0x8000, swap_key1, swap_key2, addr_key, xor_key);
+}