> Nope I didn't miss that. Chosen Ciphertext or Known Plaintext attacks
> might still proof some valueable points. Actually otherwise this would be
> less interesting.
Well, yeah but how would you get chosen / known plaintext ?
You can't really buy equipment that has TEA support in theory, its distribution is limited.
Finding TETRA stuff is already not trivial, but finding some that has TEA is even harder.
It's sometime possible to find just the FW files from some "shady connections", but it's unclear if they'd work or if they depend on some HW feature and at > 200 eur per handset not many people are ready to risk bricking them for experiments :p
And even then you often don't control enough to know / choose what it sends.
Definitely quite a challenge :) But yeah can be fun if you can afford it.
Cheers,
Sylvain