Lora payload decryption


#1

I have got the below values and I want to know how I can decrypt the bytes part.

bytes:“tgrJ5g4JoNCLmCmzRg==”
hex=“B60AC9E60E09A0D08B9829B346”
nwkkey=“67f39a7b60b807f833a497875467a3c2”
appkey=“c40af93e37530e3c87bb79486e6d8966”

Thank You,

Akarsh.


Decode LORAWAN packet coming from LORA GATEWAY
#2

I would start here and look at the decrypt methods (if you’re familiar with Go):


#3

When I try to decrypt the payload using aes-counter-128 and appSessionKey I dont get the actual plaintext.
Why might be this a problem?


#4

I have found the payload by removing the mac header and MIC.


#5

The Link : https://lorawan-packet-decoder-0ta6puiniaut.runkit.sh/?data=B60AC9E60E09A0D08B9829B346&nwkskey=67f39a7b60b807f833a497875467a3c2&appskey=c40af93e37530e3c87bb79486e6d8966

I tried and just get a little bit your data . I think your data is reversed by MSB or LSB


#6

The tool is for parsing the received lora packet.
I seperated the MIC and header part from the received packet. I am trying to decrypt the payload part using aes-counter-decrypt, where i am getting gibberish.


#7

I developed a sniffer code in arduino for lora packets. The radiohead library truncates first 4 header bytes, so I was not able to decode it properly. I changed the library code and now its working fine.