Hi, have you calculated the keystream bits with a known plaintext (for example UI frames) for each frame?
You can't use the encrypted bursts as input for Kraken -> you have to use the keystream bursts. Andi On Tue, Dec 28, 2010 at 12:36:34PM +0100, Dave Schmidt wrote: > Hello everyone, > > I'm trying to go through the example of GSM voice decryption > posted by Dieter Spaar at > http://lists.lists.reflextor.com/pipermail/a51/2010-July/000803.html > with the same example capture file provided by reflextor.com > http://reflextor.com/vf_call6_a725_d174_g5_Kc1EF00BAB3BAC7002.cfile.gz > > All steps go fine, I hear the voice - given that Kc is provided. > With Kraken, I'm trying to crack all encrypted bursts, starting > from frame 862344, and down to 862570. But Kraken does not find > any key on any of these bursts. > > I think my Kraken setup is working, at least it successfully cracks > the other example burst from Frank given here: > http://lists.lists.reflextor.com/pipermail/a51/2010-July/000688.html > I have 39 tables. > > Is the capture vf_call6... so unfortunate that none of its TS1 > encrypted bursts - about 30 of them - can be cracked? > > Thanks in advance, > > Dave > _______________________________________________ > A51 mailing list > [email protected] > http://lists.lists.reflextor.com/cgi-bin/mailman/listinfo/a51 _______________________________________________ A51 mailing list [email protected] http://lists.lists.reflextor.com/cgi-bin/mailman/listinfo/a51
