2004
DOI: 10.1007/978-3-540-28628-8_25
|View full text |Cite
|
Sign up to set email alerts
|

Faster Correlation Attack on Bluetooth Keystream Generator E0

Abstract: Abstract. We study both distinguishing and key-recovery attacks against E0, the keystream generator used in Bluetooth by means of correlation. First, a powerful computation method of correlations is formulated by a recursive expression, which makes it easier to calculate correlations of the finite state machine output sequences up to 26 bits for E0 and allows us to verify the two known correlations to be the largest for the first time. Second, we apply the concept of convolution to the analysis of the distingu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
55
1

Year Published

2004
2004
2015
2015

Publication Types

Select...
5
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 62 publications
(57 citation statements)
references
References 24 publications
1
55
1
Order By: Relevance
“…As time/data tradeoff, we might also expect to have some other linearly independent biases to be large enough so that the time is decreased at somewhat reasonably increasing cost of data/memory complexities. Nonetheless, using the computation formula of [12], we find none such bias that leads to the data complexity of less than 2 50 .…”
Section: 3mentioning
confidence: 83%
See 3 more Smart Citations
“…As time/data tradeoff, we might also expect to have some other linearly independent biases to be large enough so that the time is decreased at somewhat reasonably increasing cost of data/memory complexities. Nonetheless, using the computation formula of [12], we find none such bias that leads to the data complexity of less than 2 50 .…”
Section: 3mentioning
confidence: 83%
“…Our starting point would be the bias inside the FSM, which was discovered by [9,6] and further proved in [12] to be the the largest bias up to 26-bit output …”
Section: The Bias Inside the Fsmmentioning
confidence: 99%
See 2 more Smart Citations
“…Similar attacks can be mounted for instance against combiners with memory, as shown in [27]. A nice example of such attacks is the recent cryptanalysis of E0 presented by Lu and Vaudenay [28], [29].…”
Section: Lfsr-based Generators With Memorymentioning
confidence: 99%