I am not sure if this is the correct group - but it is one I know.
I am working with raw memory chips (98D79432) and it looks as if the
data has been processed probably with a an XOR function. Some
references imply it is XOR C5F6_128. Does anyone know what this means
and how I can decode this (by writing a program).
Does anyone a know any good refence to this subject?
My guess would be that you are working on chips from
an encrypted memory stick without having the password.
If this is encryption, XOR is used in stream ciphers.
It works by generation a cryptographically hard to
predict stream of bytes (sometimes called keystream)
and then storing the XOR with the data. For decryption,
you need to original keystream and XOR it again to the
stored data, cannecling the original keystram out
(a xor b) xor b == a.
See also
http://en.wikipedia.org/wiki/Stream_cipher
Stream ciphers are as good as the keystream. If the
keystream is generated, e.g., using AES, then the
resulting stream cipher is as hard to break as AES.
(Barring implementation mistakes, which are often
present in commercial products.)
Now, as further pure speculation, C5F6 could be a code
name for a block-cipher and _128 could specify a 128 bit
blocksize. This cipher could be used in generation
of the keystream.
If my spaculation is correct, then your best approach
is analysis of the firmware and hoping that there is
a bug in it. That is of course very, very time consuming.
If you know the device these chips are from, somebody
else may have done a cryptoanalyses and posted it
somewhere on the net.
Arno