Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

With the keys, you can do data collection now, and cracking later. You can do mass interceptions and then decide which calls you want to look at.


>With the keys, you can do data collection now, and cracking later.

Do the attacks on A5/1 require known plaintext? I was under the impression that they do not.


My understanding was that the A5/1 attack (and massive rainbow table) not only relies on known plaintext but also requires you to get the _start_ of the communication.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: