This is merely a historical archive of years 2008-2021, before the migration to mailman3.
A maintained and still updated list archive can be found at https://lists.osmocom.org/hyperkitty/list/op25-dev@lists.osmocom.org/.
matt.robert80@yahoo.com [op25-dev] op25-dev at yahoogroups.comThere has been plenty of information published on DES-OFB and ADP key recovery, including the NICTA paper 5076.. There is also the proof of concept code that validated the attacks in the paper available here:- https://github.com/stiabhan/p25lib https://github.com/stiabhan/p25lib Now, given that desktop PC's have bene used to brute force RC4 for 15 years now, it doesn't take much for anyone to recreate these attacks now, does it.... Cheers, Matt -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.osmocom.org/pipermail/op25-dev/attachments/20150209/3f6ced7f/attachment.htm>