DES-OFB traffic decryption (known key) is now supported on boatbod's fork.
How to get it working?
- Define key variables (16 hex chars) in the key file (such as example_keys.json). Make sure to specify 0x81 as algid.
- Authorize encrypted traffic sync by specifying crypt_behavior as 0 or -1.
New crypt_behavior implemented: -1
When users specify -1 as crypt_behavior, all non-encrypted transmissions will be muted and voice will only be produced on encrypted conversations.
Why? Because often times HDUs are missed and transmission start will produce undesired "encrypted sounds". This behavior (-1) will automatically mute superframes missing encryption info to prevent the generation of undesired "encrypted sounds".
Seeking testers for DES-OFB on TDMA.
How to get it working?
- Define key variables (16 hex chars) in the key file (such as example_keys.json). Make sure to specify 0x81 as algid.
- Authorize encrypted traffic sync by specifying crypt_behavior as 0 or -1.
New crypt_behavior implemented: -1
When users specify -1 as crypt_behavior, all non-encrypted transmissions will be muted and voice will only be produced on encrypted conversations.
Why? Because often times HDUs are missed and transmission start will produce undesired "encrypted sounds". This behavior (-1) will automatically mute superframes missing encryption info to prevent the generation of undesired "encrypted sounds".
Seeking testers for DES-OFB on TDMA.
Last edited: