Wiki » History » Revision 8
Revision 7 (Peter, 03/14/2013 02:11 PM) → Revision 8/16 (Karsten, 03/21/2013 08:41 AM)
h3. h1. Overview This open source software allows the 'cracking' of A5/1 keys used to secure GSM 2G calls and SMS. The cracking unitity Kraken, developed by Frank A. Stevenson, is written in C++/python and targets AMD (ATI) GPUs and CPUs. h3. Mailing list A public mailing list for announcements and discussion can be found "here":http://lists.srlabs.de/cgi-bin/mailman/listinfo/a51 . at http://lists.srlabs.de/cgi-bin/mailman/listinfo/a51. Please fill bugs Bugs and support requests must be filed through the "issue tracker":http://opensource.srlabs.de/projects/a51-decrypt/issues/new as issue tracker, they may be are of little relevance interest to the majority of the mailing list subscribers. h3. Code There are 2 independent programs, the first being Kraken and its associated utilities, developed by Frank A. Stevenson, which targets AMD (ATI) GPUs and the CPU (written in C++/python). The (read only) Kraken kraken git can be fetched with <pre> is at git://git.srlabs.de/kraken. git://git.srlabs.de/kraken </pre> The second is a device independent TMTO library, currently under development which targets ATI and NVIDIA GPUs and also the CPU (C++). h3. Related projects The A5/1 decryption was originally meant to be used with Airprobe is logistically a part of airprobe (http://airprobe.org), which allows interfacing with the radio waves with the help of gnuradio. "This tutorial":https://srlabs.de/research/airprobe-how-to/ explains the decryption process. Airprobe has, for most users, since been replaced by the cheaper "Osmocom phones":http://bb.osmocom.org h3. Further reading [[A51|Cryptoanalysis n greater detail]]