So the known plain text is a fixed length string, or can it differ dramatically.
If it is somewhat fixed we can ask the members to contribute their
known plain text into a database in order for others to use.

On Wed, Jul 28, 2010 at 10:34 PM, Frank A. Stevenson <[email protected]> wrote:
> On Wed, 2010-07-28 at 19:20 +0200, Fabio Pietrosanti (naif) wrote:
>
>> 1) Airprobe dump the phone call traffic
>>     - We know that it require important improvement for demodulation of
>> real signals
>>     - We have to see which is the best pratical approach to do it, to
>> detect the call, to follow it and which procedure must be implemented
>>
>> 2) Kraken crack the call a5/1 Kc key (that's the most important piece)
>>
>> 3) Some piece of sw decrypt the a5/1 encrypted dump generated by
>> Airprobe with the Kc cracked by Kraken.
>>
>
> There is a intermediate step here which one shouldn't forget. One needs
> to find and identify known plaintext, which can be different from
> network to network. So for initial decryption one will gave to find a
> way to get Kc from ones SIM card, and use that to decrypt and analyze
> call setup (on own conversations). This item is probably already made,
> but should be on the list. An alternative may be to use a straight dump
> from a Nokia phone.
>
> Frank
>
>
> _______________________________________________
> A51 mailing list
> [email protected]
> http://lists.lists.reflextor.com/cgi-bin/mailman/listinfo/a51
>
_______________________________________________
A51 mailing list
[email protected]
http://lists.lists.reflextor.com/cgi-bin/mailman/listinfo/a51

Reply via email to