Hello,

I'm not sure I understood the whole process of  the A5/1 attack and I have two 
more questions:

1) the tables and the lookup provides an A5/1 state that generates those 64 
bits of keystream.; which state is this? is it the state after the 100 steps 
with majority clocking and that's why you need to backclock the state provided 
by the tables?

2) how do the 32 round functions look like, or what is the difference among 
them, how do they change from one to another?

Thank you very much for helping!



      
_______________________________________________
A51 mailing list
[email protected]
http://lists.lists.reflextor.com/cgi-bin/mailman/listinfo/a51

Reply via email to