2004
DOI: 10.1007/978-3-540-30539-2_34
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of Bluetooth Keystream Generator Two-Level E0

Abstract: Abstract. In this paper, we carefully study both distinguishing and key-recovery attacks against Bluetooth two-level E0 given many short frames. Based on a flaw in the resynchronization of Bluetooth E0, we are able to fully exploit the largest bias of the finite state machine inside E0 for our attacks. Our key-recovery attack works with 2 40 simple operations given the first 24 bits of 2 35 frames. Compared with all existing attacks against two-level E0, this is the best one so far. BackgroundThe short-range w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
19
0

Year Published

2005
2005
2009
2009

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 30 publications
(19 citation statements)
references
References 12 publications
(19 reference statements)
0
19
0
Order By: Relevance
“…Compared with all existing attacks [13,14,16,20,24,29] on two-level E0, our attack is clearly the fastest and only practical resynchronization attack 6 so far. Note that the resynchronization attacks on one-level E0 were well studied in [3,14,24] to be much more efficient.…”
Section: Introductionmentioning
confidence: 90%
See 2 more Smart Citations
“…Compared with all existing attacks [13,14,16,20,24,29] on two-level E0, our attack is clearly the fastest and only practical resynchronization attack 6 so far. Note that the resynchronization attacks on one-level E0 were well studied in [3,14,24] to be much more efficient.…”
Section: Introductionmentioning
confidence: 90%
“…In order to review the reinitialization flaw discovered in [24], we first introduce some notations. Define the binary vector γ = (γ 0 , γ 1 , .…”
Section: Review On Bluetooth Two-level E0mentioning
confidence: 99%
See 1 more Smart Citation
“…For the minimum number of 132 available keystream bits the attack needs 2 84 polynomial time operations. The best currently known longkeystream attacks against E 0 are algebraic attacks [1] and correlation attacks [12,11]. These attacks all need a large amount of keystream (2 28 to 2 39 in the case of correlation attacks), and even in terms of time and memory requirements, [11] is the only feasible attack among them.…”
Section: Applicationsmentioning
confidence: 99%
“…For each r ∈ {0, 1, 2}, a register cell q N r , N r ∈ { nr 2 − 1, nr 2 }, is selected in LFSR R r as input for the clock control. The GSM standard uses the parameters (n 0 , n 1 , n 2 ) = (19,22,23) and (N 0 , N 1 , N 2 ) = (11,12,13).…”
Section: Applicationsmentioning
confidence: 99%