Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
rkangel
on Feb 25, 2015
|
parent
|
context
|
favorite
| on:
Gemalto's findings of its investigations into the ...
With the keys, you can do data collection now, and cracking later. You can do mass interceptions and then decide which calls you want to look at.
hurin
on Feb 25, 2015
[–]
>With the keys, you can do data collection now, and cracking later.
Do the attacks on A5/1 require known plaintext? I was under the impression that they do not.
BuildTheRobots
on Feb 25, 2015
|
parent
[–]
My understanding was that the A5/1 attack (and massive rainbow table) not only relies on known plaintext but also requires you to get the _start_ of the communication.
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: