![]() ![]() ![]() ![]() |
![]() |
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source | Mark Forums Read |
![]() |
| LinkBack | Thread Tools | Display Modes |
![]() | #1 (permalink) |
Junior Member Join Date: Oct 2010
Posts: 6
Member: 1422250 Status: Offline Thanks Meter: 0 | ![]() I have COMP128v2 and v3 algorithm, my team reversed it from actual SIM card. We also did an initial analysis and check for collision, nothing so so special found, but collision could occur. We are ready to sale algorithm with all of our recent analysis for collision with all codes. There is COMP128v2 and v3 DLL file. Sample caller project in C++ and in VB6 Sample attack and brute force in algorithm Collisions found in some parts of result Very very well formatted and written algorithm structure All codes, researches and papers will be sold. If you are interested, please contact me at: david.butcher123 [at] gmail Thanks |
![]() |
![]() | #3 (permalink) |
Junior Member Join Date: Oct 2010
Posts: 6
Member: 1422250 Status: Offline Thanks Meter: 0 | sbog, when you don't know anything about a subject, it's better to stay quite. It's not a newbie or fake thread post, it's a special golden post with real COMP128-2 algorithm. Just give me some sample inputs which you know their output in COMP128-2, I'll give you same results. We've successfully reversed COMp128-2, so stop disturbing and spamming my thread |
![]() |
![]() | #4 (permalink) | ||||
Freak Poster ![]() ![]() ![]() ![]() Join Date: May 2004
Posts: 115
Member: 66471 Status: Offline Thanks Meter: 7 | Quote:
Quote:
Quote:
You did not even mention neither the provider(s) whose SIM's had been used for the investigations with what CPUs and OS's - nor what method was used to extract the program and how many billions dollars your equipment costs. Mua-ha-ha-haaa.. You even did not include the source dump (or assembler code), but did include 100% unnecessary DLL's. Quote:
2. It was you who spammed in the forum by posting several identical messages in different threads such as this: http://forum.gsmhosting.com/vbb/f70/...ml#post7057176 3. All that you want - is the money of innocent victims. | ||||
![]() |
![]() | #5 (permalink) |
Junior Member Join Date: Oct 2010
Posts: 6
Member: 1422250 Status: Offline Thanks Meter: 0 | I think you don't deserve answers, I was looking for COMP128 v1 attack code to do modifications and changes and apply some different attacks on my own COMP128v2 algorithm. But it seems you don't deserve... Anyway, if anyone interested in real COMp128v2 algorithm, can contact me, algorithm is under analysis and we hope to find some kind of vulnerability in it which will allow us to clone REAL v2 and v3 cards. This is not a generic fake thread by most of lamers of this forum like sbog. Anyone interested just drop me an email for REAL conversation. Sbog, you think you know too much, but you are in a big failure, do not judge posts easily with such newbie comments. Deserving something is so important issue... |
![]() |
![]() | #6 (permalink) |
No Life Poster ![]() ![]() ![]() ![]() ![]() Join Date: Aug 2002
Posts: 628
Member: 15073 Status: Offline Thanks Meter: 12 | Hello, I think it's best to settle the discussion. I think I have a reputation already in the forum not to deceive anyone and that we helped on multiple occasions. We have been in contact with liatlevontin and Us (e n d o r a s o f t) trust in him. However, we also expressed our doubts: - That will be of interest to the COMP128 v2 someone without an algorithm extraction of Ki (the crack). - You can get the V2 crack easily. Furthermore we will help by sending a test vector check the results of his "COMP128 v2." If you serve as a reference, this is our opinion. Regards, Sir Graham w w w . e n d o r a s o f t . c o m |
![]() |
![]() | #7 (permalink) |
Junior Member Join Date: Jun 2012
Posts: 1
Member: 1766654 Status: Offline Thanks Meter: 0 | COMPv2 test vector? Can you post the response value of Comp128v2 for KEY = 00...0 and CHALLENGE = 00...0 ? We will them see if this is fake or not (I happen to know the correct answer). Thanks. |
![]() |
![]() |
Bookmarks |
Thread Tools | |
Display Modes | |
| |
![]() | ||||
Thread | Thread Starter | Forum | Replies | Last Post |
Seeking for flash nokia 5110 old version (3 version) can exchange for new | Tomas | Nokia Legacy Phones ( DCT-1 ,2 ,3 ,L ) | 8 | 10-14-2017 19:29 |
Need software upgrade for Nokia 5110 | ptkrf | Nokia Legacy Phones ( DCT-1 ,2 ,3 ,L ) | 30 | 02-24-2016 10:21 |
How can I do a Welcome note for my 6110 a dosn't have any one ? | Viper | Nokia Legacy Phones ( DCT-1 ,2 ,3 ,L ) | 8 | 06-27-2015 11:57 |
needed pinout for carkit(N61xx) | mobileinfo | Nokia Hardware & Hardware Repair | 2 | 07-23-2013 02:41 |
Operator-Logo for 5110 | MiMiR the WiseMan | Nokia Legacy Phones ( DCT-1 ,2 ,3 ,L ) | 2 | 06-25-1999 15:50 |
|