Hello,
I'm not sure I understood the whole process of the A5/1 attack and I have two
more questions:
1) the tables and the lookup provides an A5/1 state that generates those 64
bits of keystream.; which state is this? is it the state after the 100 steps
with majority clocking and that's why you need to backclock the state provided
by the tables?
2) how do the 32 round functions look like, or what is the difference among
them, how do they change from one to another?
Thank you very much for helping!
_______________________________________________
A51 mailing list
[email protected]
http://lists.lists.reflextor.com/cgi-bin/mailman/listinfo/a51