Project

General

Profile

Wiki » History » Revision 8

Revision 7 (Peter, 03/14/2013 02:11 PM) → Revision 8/16 (Karsten, 03/21/2013 08:41 AM)

h3. h1. Overview 

 This open source software allows the 'cracking' of A5/1 keys used to secure GSM 2G calls and SMS. 
 The cracking unitity Kraken, developed by Frank A. Stevenson, is written in C++/python and targets AMD (ATI) GPUs and CPUs.  

 h3. Mailing list 

 A public mailing list for announcements and discussion can be found "here":http://lists.srlabs.de/cgi-bin/mailman/listinfo/a51 . at http://lists.srlabs.de/cgi-bin/mailman/listinfo/a51. 
 Please fill bugs Bugs and support requests must be filed through the "issue tracker":http://opensource.srlabs.de/projects/a51-decrypt/issues/new as issue tracker, they may be are of little relevance interest to the majority of the mailing list subscribers. 

 h3. Code 

 


 There are 2 independent programs, the first being Kraken and its associated utilities, developed by Frank A. Stevenson, which 
 targets AMD (ATI) GPUs and the CPU (written in C++/python). The (read only) Kraken kraken git can be fetched with  

 <pre> is at git://git.srlabs.de/kraken. 
 git://git.srlabs.de/kraken 
 </pre> The second is a device independent TMTO library, currently under development which targets ATI and NVIDIA GPUs and also the CPU (C++). 

 h3. Related projects 

 The A5/1 decryption was originally meant to be used with Airprobe is logistically a part of airprobe (http://airprobe.org), which allows interfacing with the radio waves with 
 the help of gnuradio. "This tutorial":https://srlabs.de/research/airprobe-how-to/ explains the decryption process. 

 Airprobe has, for most users, since been replaced by the cheaper "Osmocom phones":http://bb.osmocom.org 

 h3. Further reading 

 [[A51|Cryptoanalysis n greater detail]]