Nice writeup! I'm going to be decoding a variety of air conditioner remotes in the future so this will be a good reference.<p>If anyone is interested in the process of reverse engineering an infrared remote from "I have a raspberry pi and some electronics" to "I can decode and encode infrared signals to control my stuff", I have an article on that:<p><a href="https://blog.bschwind.com/2016/05/29/sending-infrared-commands-from-a-raspberry-pi-without-lirc/" rel="nofollow">https://blog.bschwind.com/2016/05/29/sending-infrared-comman...</a><p>There are better ways to do what I've described there but it's a good start.
Coming from a statistics background, this kind of work is totally unfamiliar and very fascinating. This kind of high dimensional, complex data seems like it would admit some very interesting machine learning. And I wonder if the techniques described here could be adapted outside of cryptography for inference or other data processing applications.
This is a little scary. I'm in the middle of doing this exact same thing. Not sure if it's compatible or if I'll have to do the same thing.
Nice read, it reminds me of CrcRevEng[1], it was really useful several times when I needed to find what CRC algorithm a vendor used. The most fun was when I tried to RE disassembled function named crc_512. Turns out it was a checksum of 4 bytes.<p>[1] <a href="http://reveng.sourceforge.net/" rel="nofollow">http://reveng.sourceforge.net/</a>
Wow sounds like whoever engineered that checksum was a missy elliot fan: <a href="https://xkcd.com/153/" rel="nofollow">https://xkcd.com/153/</a>