John wrote:
After getting that getting started, though, I suggest
beginning a brute-force attack on the GSM cellphone
encryption algorithm. That's in use in hundreds of millions
of devices worldwide, protecting (or failing to protect) the
privacy of billions of phone calls a day.
On Thu, Sep 26, 2002 at 02:45:12PM -0700, John Gilmore wrote:
[...]
After getting that getting started, though, I suggest beginning a
brute-force attack on the GSM cellphone encryption algorithm. That's
in use in hundreds of millions of devices worldwide, protecting (or
failing to
Ralf-P. Weinmann[SMTP:[EMAIL PROTECTED]] wrote:
On Thu, Sep 26, 2002 at 02:45:12PM -0700, John Gilmore wrote:
[...]
After getting that getting started, though, I suggest beginning a
brute-force attack on the GSM cellphone encryption algorithm. That's
in use in hundreds of
On Thu, 26 Sep 2002, Lucky Green wrote:
Software defined radios would be well-suited to task, but those who
expended the effort of writing software-defined cellular telephony
modules so far understandably chose to sell the fruits of their labor to
paying customers rather than releasing the
At 01:16 PM 9/27/2002 +0200, Ralf-P. Weinmann wrote:
Is A5/3 deployed yet?
Kasumi (in the form of f8 (ciphering) and f9 (integrity) is beginning
to be deployed in UMTS (WidebandCDMA) mobiles as we speak. But an exact
specification of how to use Kasumi as A5/3 has only just been agreed; it