Cryptanalysis of Bluetooth Encryption

    Date09 May 2006
    Posted ByBrittany Day
    Encryption is the most important part in computer security mechanisms and protocols: he who can bypass cryptographic protection, gains total control over the security. Password management, secure network transmission protocol, wireless protocol (Wep, WPA, Bluetooth, GSM), integrity checking (e.g. in antivirus software), data protection, login authentication are well-known examples whose security heavily relies on cryptographic mechanisms. One well illustrative example, among many others, is the Bluetooth protocol used for wireless communications between mobile devices: laptops, PDA, cell phones, printers, cars... This protocol embeds cryptographic multi-level security.

    Cryptology ensures a high level of security for both encryption and authentication. This implies that nobody can remotely and unlegitimately either connect to or log in to Bluetooth devices and proceed to its infection. With the same considerations in mind, encryption of data stream between two or more communicating devices prevents anyone from manipulating, subverting or corrupting it. The encryption cryptographic core uses the stream cipher E0, whose key entropy is 128 bits. The key length thus prevents any cryptanalysis by exhaustive search. Moreover, up to now, the encryption security of E0 has not been challenged from a practical point of view. A few attacks of theoretical interest only have been published. Unless irrealistic assumptions are to be made, E0 has not been broken yet and the cryptographic security of Blue- tooth protocol is still very high.

    You are not authorised to post comments.

    LinuxSecurity Poll

    What is your favorite page/section?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 4 answer(s).
    [{"id":"73","title":"News","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"74","title":"Advisories ","votes":"4","type":"x","order":"2","pct":80,"resources":[]},{"id":"75","title":"HOWTOs","votes":"0","type":"x","order":"3","pct":0,"resources":[]},{"id":"76","title":"Latest Features ","votes":"1","type":"x","order":"4","pct":20,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.