chopchoptheory
Differences
This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
chopchoptheory [2006/11/19 16:12] – darkaudax | chopchoptheory [2010/11/21 15:46] (current) – typos sleek | ||
---|---|---|---|
Line 30: | Line 30: | ||
* D0 to D4 remain the same. | * D0 to D4 remain the same. | ||
* R5 = I3 + K5 = I3 + (D5+D5) + K5 = (I3+D5) + (D5+K5) = X + S5. | * R5 = I3 + K5 = I3 + (D5+D5) + K5 = (I3+D5) + (D5+K5) = X + S5. | ||
- | * R6 to R8 are computed by reversing one crc step based on the value of X. There' | + | * R6 to R8 are computed by reversing one crc step based on the value of X. There' |
* J0 depends only on X. K9 = S9 + J0. We have guessed the last message byte and the last byte of keystream. | * J0 depends only on X. K9 = S9 + J0. We have guessed the last message byte and the last byte of keystream. | ||
Line 36: | Line 36: | ||
By doing this, we have found a valid frame 1 byte shorter than original one, and we have guessed one byte of keystream. This process can be induced to get the whole keystream. | By doing this, we have found a valid frame 1 byte shorter than original one, and we have guessed one byte of keystream. This process can be induced to get the whole keystream. | ||
+ | |||
+ | For additional detailed descriptions see: | ||
+ | |||
+ | * [[http:// | ||
+ | * [[http:// | ||
+ | |||
+ | |||
chopchoptheory.txt · Last modified: 2010/11/21 15:46 by sleek