Terminal-based RF signal analysis for automotive keyfobs
Rust module: src/protocols/kia_v6.rs
Reference: REFERENCES/ProtoPirate/protocols/kia_v6.c
Kia V6 uses Manchester encoding at 200/400 µs (level convention inverted vs Flipper). 144 bits in three parts: part1 (64) + part2 (64) + part3 (16); each part stored inverted. Long preamble of 601 pairs; sync bits 1,1,0,1 then data. AES-128 decryption with key derived from KIA V6 A and B keystores (types 11 and 12) and XOR masks.
| Parameter | Value | Notes |
|---|---|---|
| Short | 200 µs | ±100 µs |
| Long | 400 µs | ±100 µs |
| Preamble | 601 pairs | |
| Min bits | 144 |
Manchester (event mapping 0/2/4/6 for level convention). Three 64/64/16-bit segments, each inverted when stored.
AES-128 decrypt with key = f(keystore_a, keystore_b, XOR_MASK_LOW, XOR_MASK_HIGH). Serial/button/counter, CRC, and fx_field extracted after decryption. The fx_field is derived from the top 2 bytes of stored_part1_high and stored in DecodedSignal.extra.
Supported. Ported from ProtoPirate (ENABLE_EMULATE_FEATURE). Builds plaintext (fx_field, serial, button, counter, S-box CRC, CRC8), AES-128 encrypts, packs into 3 parts, then Manchester encodes with two-pass preamble (640 pairs + data, gap, 38 pairs + data). Requires fx_field from decoded signal’s extra field.
433.92 MHz.
Requires KIA V6 A and B keys (keystore types 11 and 12: kia_v6_a_key, kia_v6_b_key). XOR masks applied to derive AES key.