Sciweavers

43 search results - page 3 / 9
» Bluetooth Security
Sort
View
CISC
2005
Springer
169views Cryptology» more  CISC 2005»
14 years 1 months ago
On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography
Abstract. Despite many good (secure) key agreement protocols based on publickey cryptography exist, secure associations between two wireless devices are often established using sym...
Serge Vaudenay
SPW
2005
Springer
14 years 28 days ago
Repairing the Bluetooth Pairing Protocol
Abstract. We implement and demonstrate a passive attack on the Bluetooth authentication protocol used to connect two devices to each other. Using a protocol analyzer and a brute-fo...
Frank Stajano
SACRYPT
2001
Springer
126views Cryptology» more  SACRYPT 2001»
13 years 12 months ago
Analysis of the E0 Encryption System
The encryption system E0, which is the encryption system used in the Bluetooth specification, is examined. In the current paper, a method of deriving the cipher key from a set of ...
Scott R. Fluhrer, Stefan Lucks
CCN
2006
278views Communications» more  CCN 2006»
13 years 8 months ago
Detecting rogue devices in bluetooth networks using radio frequency fingerprinting
Unauthorized Bluetooth devices or rogue devices can impersonate legitimate devices through address and link key spoofing. Moreover, they can infiltrate a Bluetooth network and ini...
Jeyanthi Hall, Michel Barbeau, Evangelos Kranakis
CRYPTO
2004
Springer
128views Cryptology» more  CRYPTO 2004»
14 years 25 days ago
Faster Correlation Attack on Bluetooth Keystream Generator E0
We study both distinguishing and key-recovery attacks against E0, the keystream generator used in Bluetooth by means of correlation. First, a powerful computation method of correla...
Yi Lu 0002, Serge Vaudenay