If the unlock-code is hashed with sha1 I don't see a way to reverse that. AFAIK it's not a matter of decrypting here since sha1 is a hashing-algo. If samsung did their work right there's only brute-forcing left. One could create a rainbowtable that holds the hashes of all known-length (16 digits) unlock-codes but that would take like forever - and result in a ridiculously big file. I would be happy to hear what you guys are gonna try...
Currently Odia is brute forcing it
I don't fully understand how it works, but here's what I do understand...
When you know the unlock code, you enter it into Android, which sends it to the radio, and something "happens". It then finds out if it worked or not...
What I will say is that Odia knows this stuff very well, so I'm just going to stop talking now
I think it is gonna be possible, given that video showing it being done. I can sorta imagine what it's doing, but I can't think how to explain it.