Hi Vadim,

the average success probability of 90+% was calculated from cracking 8
bursts (ie, two known packets). In all networks I've analyzed, there
were at least 5 predictable packets in every call setup.

Cheers,

   -Karsten


On 23-Nov-10 11:49, Vadim Uvin wrote:
> Hello list,
> 
> I'm rinning the Berlin set of rainbow tables. All 40 tables can be
> loaded with Kraken:
> 
> sudo ./kraken ../indexes/
> 
> Device: /dev/sda6 10
> /dev/sda6
> Device: /dev/sda7 10
> /dev/sda7
> Device: /dev/sdb1 10
> /dev/sdb1
> Device: /dev/sdb5 10
> /dev/sdb5
> Allocated 41259888 bytes: ../indexes//324.idx
> ...
> Tables:
> 324,292,340,268,108,372,276,332,260,380,100,420,428,436,396,500,404,388,412,
> 492,188,164,132,156,140,180,172,148,116,124,196,230,348,204,238,212,356,250,220,364
> 
> I am able to perform the cracking of test burst.
> 
> Now I am trying to crack some capture I've made. The channel is strong,
> I see no errors when decode it with Airprobe. After some trying I
> finally correctly quess the keystream which gives the state in the
> tables, then I use the find_kc utility to find the ciphering key. I am
> able to use the found key to decode the rest of SDCCH after ciphering
> command.
> 
> I want to check the probability of successful cracking, so I save the
> output of Airprobe to some file and try to crack the rest of the
> keystreams which were used for ciphering the UI, SI5/6 messages. I take
> them from the lines of the Airprobe output that are started with "S0" or
> "S1", e.g. these are the keystreams of UI frame:
> 
> S1 1850457 2857739:
> 110101111011111100001001100111110011000110001010100011101010001100100000110011110111111101111100111001000010001101
> 
> S0 1850458 2857772:
> 110000111011111111110011110001000001101101110000110011011010100111100110100110101110110011101001001111100111011101
> <- produces the state 2da68ebda80e149f
> S0 1850459 2857805:
> 110001110000011010000111110010010001000001111011010001011110000010111110101010010001011000101101111000110110111101
> S0 1850460 2857838:
> 111100101001101101100110100001110111111100100001000011101001111000011111100100101111000001010001101100000101100100
> <- produces the state 8c1b5baf6279735c
> 1850460 1: 03 03 01 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b
> 2b 2b 2b
> 
> I've tried 13 keystreams, but only 3 of them have produced states. This
> is far beyond the 90% probability of successful cracking, as it stated
> here: http://srlabs.de/research/decrypting_gsm/. I have another 2
> captures made at different time, but the situation is the same. I can
> only crack around 20-30% of keystreams.
> 
> Does anybody have any idea why this happens? Or am I just doing
> something wrong?
> 
> I also would like to ask somebody to try to crack some of these
> keystreams, especially those where no state was found:
> 
> Kraken> crack
> 000010110010111001011101110010110001010110010101101000101000110101010011010101001001000110001100011000000010010010
> Kraken> crack
> 110101011111000101110110001101011000101111011011011101100010011010110110001011011010100110100010110011111001111111
> Found 7de2f0f8f8559552 @ 34  #2  (table:164)
> Kraken> crack
> 110101111011111100001001100111110011000110001010100011101010001100100000110011110111111101111100111001000010001101
> Kraken> crack
> 110000111011111111110011110001000001101101110000110011011010100111100110100110101110110011101001001111100111011101
> Found 2da68ebda80e149f @ 4  #4  (table:132)
> Kraken> crack
> 110001110000011010000111110010010001000001111011010001011110000010111110101010010001011000101101111000110110111101
> Kraken> crack
> 111100101001101101100110100001110111111100100001000011101001111000011111100100101111000001010001101100000101100100
> Found 8c1b5baf6279735c @ 4  #6  (table:100)
> Kraken> crack
> 010110101101100111110111000001101010111101101000110101010011101100110100000110001101111010110101110000000001000111
> Kraken> crack
> 011111010001111111100001111110000101111000110001000101001011100111011001111100101100010011010110011101101010110011
> Kraken> crack
> 011010101101001110100110001000010011001101101101011001001101011110111000101111011011000011011110010101101100001100
> Kraken> crack
> 000110110011100100001100100011001011111001001010111101010001101011100001010110000011011101001010000000010010110000
> Kraken> crack
> 111011100001110101000001110001000110001001001110001010000101010110011101100100111000001000110110010111000110111001
> Kraken> crack
> 111100111010110011100100000000000111111110000100100001101000111011110101011001111100000111111010101001110100010001
> Kraken> crack
> 000100101001111010010100010101110101011101001001100010100100000011101101110110111111101101111110111111100101101000
> Kraken> crack
> 011111000111110110110000000000010111100000110011001000110001111000111010101010010111011110110001101100111100111000
> 
> Thanks.
> 
> Vadim.
> 
> 
> 
> _______________________________________________
> A51 mailing list
> [email protected]
> http://lists.lists.reflextor.com/cgi-bin/mailman/listinfo/a51
_______________________________________________
A51 mailing list
[email protected]
http://lists.lists.reflextor.com/cgi-bin/mailman/listinfo/a51

Reply via email to