Found them..turns out the 3rd burst in the LAPDm UI gave results.

 

 

LAPDm UI Unencrypted

 

P1 862210 1331352:
1000000100011101010100000000101000000001111111010100000010100001000101110101
00000000101000010000010101010100000010

P0 862211 1331385:
1010101111111111010000001010101011111111111101000000001000101111111111110101
01000000001010101011011101010000001000

-- > P0 862212 1331392:
0000000111110101010100001000000100010101110101010000101000010100011111010100
01000010000000000101110101010100000010

P0 862213 1331425:
0001000010101010101111011101010100000000101011101111110101000100000010101010
11011101010001000010001011101111010101

 

LAPDm UI Encrypted

 

P1 862567 1331345:
0000000101001110010000010000101101001111110110110001000110010011111011010110
11010001010001100111010110110101001010 /1

P0 862568 1331378:
1010001100111110110000000110100010110100011111011000100101110010110010100000
10101100101101101110111000101110010011 /2

-- > P0 862569 1331411:
1101111000010101100000110110001000000011101000010010010111101111110011111111
00101011101010110111100000000000000010 /3

P0 862570 1331444:
0011000011011001001000110110011010101010101011010001010100011010111110110100
01100111100111011000010100001011011000

 

 

P0 862212 1331392:
0000000111110101010100001000000100010101110101010000101000010100011111010100
01000010000000000101110101010100000010

P0 862569 1331411:
1101111000010101100000110110001000000011101000010010010111101111110011111111
00101011101010110111100000000000000010

 

./xor.py
0000000111110101010100001000000100010101110101010000101000010100011111010100
01000010000000000101110101010100000010
1101111000010101100000110110001000000011101000010010010111101111110011111111
00101011101010110111100000000000000010

 

XOR Output :
1101111111100000110100111110001100010110011101000010111111111011101100101011
01101001101010110010010101010100000000

 

Kraken> crack
1101111111100000110100111110001100010110011101000010111111111011101100101011
01101001101010110010010101010100000000

 

Cracking
1101111111100000110100111110001100010110011101000010111111111011101100101011
01101001101010110010010101010100000000

Found 34fa3974588953fc @ 8  #42  (table:164)

crack #42 took 59855 msec

 

./find_kc 34fa3974588953fc 8 1331411 1331378
0000100011000001100000001100001001001011100010011000101101011101001101010101
11101100100111000101100101111110011011

#### Found potential key (bits: 8)####

2d8fc3bd32e138c8 -> 2d8fc3bd32e138c8

Framecount is 1331411

KC(0): 57 a3 44 dc 69 45 71 ed  mismatch

KC(1): 1e f0 0b ab 3b ac 70 02  *** MATCHED ***

KC(2): b4 57 3e eb 11 55 77 12  mismatch

KC(3): 0f 7e 5e 02 fa 53 86 8e  mismatch

KC(4): 60 b8 8e 14 6f b9 2c 23  mismatch

 

Van: g0tcha [mailto:g0t...@3gp.za.net] 
Verzonden: maandag 24 januari 2011 12:28
Aan: 'Jasper Kanbier'
Onderwerp: RE: [A51] Which Burst are XOR-ed in SRLABS test capture??

 

Hi

 

Trying to figure the same thing for a while now. If you make any progress I
will be glad to pay for the info also. I don't know what else to do.

 

 

 

From: a51-boun...@lists.reflextor.com
[mailto:a51-boun...@lists.reflextor.com] On Behalf Of Jasper Kanbier
Sent: Monday, January 24, 2011 1:25 PM
To: a51@lists.reflextor.com
Subject: [A51] Which Burst are XOR-ed in SRLABS test capture??

 

Hi,

 

Trying to get some feeling which bursts to xor in order to get some correct
keystreams.

I thought a good place to start was the vf_call  test capture from the
srlabs site.

 

But I fail to figure out which burst are xor'ed in order to obtain a match
in find_kc

Anyone managed to extract de Kc form the capture??

 

Gr Jasper

_______________________________________________
A51 mailing list
A51@lists.reflextor.com
http://lists.lists.reflextor.com/cgi-bin/mailman/listinfo/a51

Reply via email to