Hi,

have you calculated the keystream bits with a known plaintext (for example
UI frames) for each frame? 

You can't use the encrypted bursts as input for Kraken -> you have to use 
the keystream bursts.

Andi

On Tue, Dec 28, 2010 at 12:36:34PM +0100, Dave Schmidt wrote:
> Hello everyone,
> 
> I'm trying to go through the example of GSM voice decryption 
> posted by Dieter Spaar at
> http://lists.lists.reflextor.com/pipermail/a51/2010-July/000803.html
> with the same example capture file provided by reflextor.com
> http://reflextor.com/vf_call6_a725_d174_g5_Kc1EF00BAB3BAC7002.cfile.gz
> 
> All steps go fine, I hear the voice - given that Kc is provided.
> With Kraken, I'm trying to crack all encrypted bursts, starting
> from frame 862344, and down to 862570. But Kraken does not find
> any key on any of these bursts.
> 
> I think my Kraken setup is working, at least it successfully cracks
> the other example burst from Frank given here:
> http://lists.lists.reflextor.com/pipermail/a51/2010-July/000688.html
> I have 39 tables.
> 
> Is the capture vf_call6... so unfortunate that none of its TS1
> encrypted bursts - about 30 of them - can be cracked?
> 
> Thanks in advance,
> 
> Dave
> _______________________________________________
> A51 mailing list
> [email protected]
> http://lists.lists.reflextor.com/cgi-bin/mailman/listinfo/a51
_______________________________________________
A51 mailing list
[email protected]
http://lists.lists.reflextor.com/cgi-bin/mailman/listinfo/a51

Reply via email to