On Thu, Dec 31, 2009 at 5:28 PM, javier falbo <javier_fa...@hotmail.com> wrote: [snip] > networks, routinely monitors the work of groups in this area. In 2007-8, a > hacking group claimed to be building an attack on A5/1 by constructing a > large look-up table1 of approximately 2 Terabytes – this is equivalent to > the amount of data contained in a 20 kilometre high pile of books. In > theory, someone with access to the data in such a table could use it to > analyse an encrypted call and recover the encryption key. > Another group has announced similar plans in 2009. However, before a > practical attack could be attempted, the GSM call has to be identified and > recorded from the radio interface. So far, this aspect of the methodology > has not been explained in any detail and we strongly suspect that the teams > attempting to develop an intercept capability have underestimated its > practical complexity. A hacker would need a radio receiver system and the > signal processing software necessary to process the raw radio data. The
Hilarious. But really— this is what you get for not running a demo: Continued lies and misdirection from an industry which has had many years to get its act straight but hasn't. http://myrandomnode.dyndns.org:8080/~gmaxwell/omg_radios.jpg I would have added a 2TB hdd and a GTX275 to the picture but that would have required pulling them out of busy systems. This is such a joke— not only is the attack possible, its relatively cheap to perform. _______________________________________________ A51 mailing list A51@lists.reflextor.com http://lists.lists.reflextor.com/cgi-bin/mailman/listinfo/a51