Project

General

Profile

Wiki » History » Revision 11

Revision 10 (Karsten, 03/21/2013 08:43 AM) → Revision 11/16 (Karsten, 03/22/2013 10:19 AM)

h3. Overview 

 This open source software allows the 'cracking' of A5/1 keys used to secure GSM 2G calls and SMS. 
 The cracking unitity Kraken, developed by Frank A. Stevenson, is written in C++/python and targets AMD (ATI) GPUs and CPUs.  

 h3. Mailing list 

 A public mailing list for announcements and discussion can be found "here":http://lists.srlabs.de/cgi-bin/mailman/listinfo/a51 . 
 Please fill bugs and support requests through the "issue tracker":http://opensource.srlabs.de/projects/a51-decrypt/issues/new as they may be of little relevance to the majority of the mailing list subscribers. 

 h3. Code 

 The (read only) Kraken git can be fetched with  

 <pre> 
 git clone git://git.srlabs.de/kraken 
 </pre> 

 h3. Related projects 

 The A5/1 decryption was originally meant to be used with "Airprobe":http://airprobe.org), which allows interfacing with the radio waves with 
 the help of gnuradio. "This tutorial":https://srlabs.de/airprobe-how-to/ tutorial":https://srlabs.de/research/airprobe-how-to/ explains the decryption process. 

 Airprobe has, for most users, since been replaced by the cheaper "Osmocom phones":http://bb.osmocom.org 

 h3. Further reading 

 [[A51|Cryptoanalysis n greater detail]]