They aren't encrypted, they are signed. We cannot do anything with this.
Sent from my SCH-I535 using xda app-developers app
Yes, the difference between encryption and a signature is important. Encryption is used to stop a person/computer from being able to read your files in plain text (unencrypted). A signature is used to make sure a file has not been tampered with in any way, and is exactly in the state it was when the person who signed the package/document sent it.
In android, we can open up RUU's and other files and look at them no problem. If it was encrypted, we would open the file and see nothing but nonsense (crazy characters, and other odd symbols). If we try to flash a file that has SU put in by someone who is NOT the person who signed it on a bootloader that checks and expects a certain signature, since the file has been tampered with, it will not accept the tampered file. If the bootloader accepted an XDA signature for example, we would be able to sign files with our key and everything would be fine, as long as the bootloader was programmed to accept an XDA key.
Now that being said, we CANNOT break the signature (or even if it was encrypted we couldn't break that either) since the signature is a long one and the companies have their own algorithms. It would literally take decades using a super computer to break it, considering you have to try each and every single combination of words, symbols, and letters in the english (and even other) language(s).
EDIT:
I have read the last pages and what are you guys talking about? This WON'T be easy. How are you going to convince the phone to accept our spoofed address over AT&T's? What happens when our phones see 2 of the same address? Oh and just "sniff the traffic", uh, no. You can't sniff mobile traffic on your 1337oMfGb4CkTr4Ck computer. Someone needs a wireless GSM traffic sniffing device. That *s*hi*t is hard to do and you need a rooted device to easily do it on android itself.
If someone who is stock rooted can go here
https://sites.google.com/site/androidarts/packet-sniffer and then try to OTA update, we could see where it connects to and the goodies. Then we could go from there.
Oh and you need to use wifi and then try to OTA update, the app doesn't do mobile traffic.