...
Object | Length (bytes) | Comments |
---|---|---|
x | 1 | |
Length | 1 | |
PIN | 4 to 16 | Non-used digits set to random padding |
Example
Below is an example of data received after a successful PIN entry:
Code Block |
---|
3cb9dd2f5021af506a74a0b14bf1d67479173e1302404d645fe2ddd382a26097be43c799a6d79bd759e3a
e0cabab835b31cb859ed8d900264522c2cef426de597becad0738c78578aa5538df3ad9f9f6a0c5c25e45
30d1754021c99faa037aabfe90cd1af8c3a68ebeabd9dce2df3cdf9208a55e7c94a13331b362fc3fedc57
e766c8aa8bc3ce750196857b832ff81027bd4168422a7b8ca1334a9df358038c48f9fb3d96c80f06d2899
87ffd313984cd540faa08e280911524fde4956091c8704455d7c652022a244955d6c60407b32a31c52f23
c93896f292f489e9c9349047997024ae33cf997bb5436bfdfb53eed28021354baab0fecd30bf3c58cacf0
d6a309d25919948c521e8d795d16b74a3fe4a114709e |
Which can be split into:
The key ID:
Code Block |
---|
3cb9dd2f50 |
The encrypted KEK:
Code Block |
---|
21af506a74a0b14bf1d67479173e1302404d645fe2ddd382a26097be43c799a6d79bd759e3ae0cabab835
b31cb859ed8d900264522c2cef426de597becad0738c78578aa5538df3ad9f9f6a0c5c25e4530d1754021
c99faa037aabfe90cd1af8c3a68ebeabd9dce2df3cdf9208a55e7c94a13331b362fc3fedc57e766c8aa8b
c3ce750196857b832ff81027bd4168422a7b8ca1334a9df358038c48f9fb3d96c80f06d289987ffd31398
4cd540faa08e280911524fde4956091c8704455d7c652022a244955d6c60407b32a31c52f23c93896f292
f489e9c9349047997024ae33cf997bb5436bfdfb53eed28021354baab0fecd30bf3c58cacf0d6a309d259
19 |
The encrypted pseudo PIN-block:
Code Block |
---|
948c521e8d795d16b74a3fe4a114709e |
Applying an RSA decryption (RSA/ECB/OAEPWithSHA-256AndMGF1Padding
) on the “encrypted KEK” block will lead to:
The KEK:
Code Block |
---|
eaa5e9bbd66899cc561ee20ca9b3e775 |
The IV:
Code Block |
---|
00000000000000000000000000000000 |
Applying a AES decryption (AES/CBC/NoPadding
) on the “encrypted pseudo PIN-block” will provide the following pseudo PIN block data:
Code Block |
---|
1415958944b2c2d77cb7fad1622bb213 |
Which can be split into:
The PIN:
Code Block |
---|
1595 |
The random padding:
Code Block |
---|
8944b2c2d77cb7fad1622bb213 |