Sciweavers

5 search results - page 1 / 1
» Cracking the Bluetooth PIN
Sort
View
MOBISYS
2005
ACM
14 years 10 months ago
Cracking the Bluetooth PIN
This paper describes the implementation of an attack on the Bluetooth security mechanism. Specifically, we describe a passive attack, in which an attacker can find the PIN used du...
Yaniv Shaked, Avishai Wool
FC
2007
Springer
141views Cryptology» more  FC 2007»
14 years 5 months ago
The Unbearable Lightness of PIN Cracking
Responding to the PIN cracking attacks from Berkman and Ostrovsky (FC 2007), we outline a simple solution called salted-PIN. A randomly generated salt value of adequate length (e.g...
Omer Berkman, Odelia Moshe Ostrovsky
FUN
2010
Springer
279views Algorithms» more  FUN 2010»
13 years 8 months ago
Cracking Bank PINs by Playing Mastermind
The bank director was pretty upset noticing Joe, the system administrator, spending his spare time playing Mastermind, an old useless game of the 70ies. He had fought the instinct ...
Riccardo Focardi, Flaminia L. Luccio
ADHOCNOW
2006
Springer
14 years 4 months ago
Improved Pairing Protocol for Bluetooth
Abstract. The Bluetooth wireless technology realizes a low-cost shortrange wireless voice- and data-connection through radio propagation. Bluetooth also has a security architecture...
Dave Singelée, Bart Preneel
SPW
2005
Springer
14 years 4 months ago
Repairing the Bluetooth Pairing Protocol
Abstract. We implement and demonstrate a passive attack on the Bluetooth authentication protocol used to connect two devices to each other. Using a protocol analyzer and a brute-fo...
Frank Stajano