F = F' XOR H = [ 6E 2A CE 61 ] XOR [ 5B 17 4D 6A ] = [ 35 3D 83 0B ]
G = G' XOR H = [ F7 98 08 9B ] XOR [ 5B 17 4D 6A ] = [ AC 8F 45 F1 ]
L = FGH = [ 35 3D 83 0B AC 8F 45 F1 5B 17 4D 6A ]
convert to base 32 license key:
L = binary string 00110101001111011000001100001011
10101100100011110100010111110001
01011011000101110100110101101010
split L into 4 groups of 4 fives, overlapped by 1:
00110 10100 11110 11000 00110 <- last bit of this line and first bit of next
line are the same value
00001 01110 10110 01000 11110 <- .. same for this line
01000 10111 11000 10101 10110 <- .. and this line too
00010 11101 00110 10110 10100 <- last bit of this line is not used and may
also be set to 1 without negative effect.
axent-generated keys possibly leave this as
zero, as with our original 25 user key
using digits QWERTYUPASDFGHJKLZXCVBNM65324978 convert to base 32 string:
license key = "UV76U-WJNA7-AM6BN-E9UNV"
(or UV76U-WJNA7-AM6BN-E9UNB with last bit set)
Name:
Anonymous2007-03-31 0:42 ID:b0iPOPCD
very nice keygen over there,
even though i personally find keygens not to be very useful compared to cracks(why would i want to spend a day or two analyzing some useless algo that might not even be bruteforceable(if implemented correctly) in a reasonable amount of time), and in some cases keygens are not feasible at all(ex. when using DRM's from protectors like ASPR1,2/Armadillo, unless you replace the RSA keys, but then an unwrapped version would run better anyway without that lame layer and other people could reverse the code as well, instead beeing limited by the protections layer), one can simply unwrap those and patch it up =)