T
2011-09-12 21:21:50 UTC
I have downloaded the tables from
http://opensource.srlabs.de/projects/a51-decrypt/files and the kracken
code from git://git.srlabs.de/kraken.git, compiled and installed
everything.
I have successfully run through the example at
www.ks.uni-freiburg.de/download/misc/practical_exercise_a51.pdf and
http://srlabs.de/uncategorized/airprobe-how-to/
I had a few questions I was hoping someone would be able to answer:
Can uplink bursts be cracked? It looks like find_kc will need to be
modified for uplink, are any other changes required? Has anyone tried
that?
Why are only some bursts able to be cracked?
What percentage of bursts is expected to be cracked?
Should at least one of the four bursts in a message always be cracked?
Thanks for any info you can provide.
-Todd
(sorry if this is a repost, I was having email issues)
http://opensource.srlabs.de/projects/a51-decrypt/files and the kracken
code from git://git.srlabs.de/kraken.git, compiled and installed
everything.
I have successfully run through the example at
www.ks.uni-freiburg.de/download/misc/practical_exercise_a51.pdf and
http://srlabs.de/uncategorized/airprobe-how-to/
I had a few questions I was hoping someone would be able to answer:
Can uplink bursts be cracked? It looks like find_kc will need to be
modified for uplink, are any other changes required? Has anyone tried
that?
Why are only some bursts able to be cracked?
What percentage of bursts is expected to be cracked?
Should at least one of the four bursts in a message always be cracked?
Thanks for any info you can provide.
-Todd
(sorry if this is a repost, I was having email issues)