I have downloaded the tables from http://opensource.srlabs.de/projects/a51-decrypt/files and the kracken code from git://git.srlabs.de/kraken.git, compiled and installed everything. I have successfully run through the example at www.ks.uni-freiburg.de/download/misc/practical_exercise_a51.pdf and http://srlabs.de/uncategorized/airprobe-how-to/
I had a few questions I was hoping someone would be able to answer: Can uplink bursts be cracked? It looks like find_kc will need to be modified for uplink, are any other changes required? Has anyone tried that? Why are only some bursts able to be cracked? What percentage of bursts is expected to be cracked? Should at least one of the four bursts in a message always be cracked? Thanks for any info you can provide. -Todd (sorry if this is a repost, I was having email issues) _______________________________________________ A51 mailing list [email protected] http://lists.lists.reflextor.com/cgi-bin/mailman/listinfo/a51
