On Thu, Dec 31, 2009 at 5:28 PM, javier falbo <javier_fa...@hotmail.com> wrote:
[snip]
> networks, routinely monitors the work of groups in this area. In 2007-8, a
> hacking group claimed to be building an attack on A5/1 by constructing a
> large look-up table1 of approximately 2 Terabytes – this is equivalent to
> the amount of data contained in a 20 kilometre high pile of books. In
> theory, someone with access to the data in such a table could use it to
> analyse an encrypted call and recover the encryption key.
> Another group has announced similar plans in 2009. However, before a
> practical attack could be attempted, the GSM call has to be identified and
> recorded from the radio interface. So far, this aspect of the methodology
> has not been explained in any detail and we strongly suspect that the teams
> attempting to develop an intercept capability have underestimated its
> practical complexity. A hacker would need a radio receiver system and the
> signal processing software necessary to process the raw radio data. The

Hilarious.

But really— this is what you get for not running a demo: Continued
lies and misdirection from an industry which has had many years to get
its act straight but hasn't.


http://myrandomnode.dyndns.org:8080/~gmaxwell/omg_radios.jpg
I would have added a 2TB hdd and a GTX275 to the picture but that
would have required pulling them out of busy systems.  This is such a
joke— not only is the attack possible, its relatively cheap to
perform.
_______________________________________________
A51 mailing list
A51@lists.reflextor.com
http://lists.lists.reflextor.com/cgi-bin/mailman/listinfo/a51

Reply via email to