conference paper
Cryptanalysis of Bluetooth Keystream Generator Two-level E0
2005
ASIACRYPT 2004: Advances in Cryptology - ASIACRYPT 2004
In this paper, we carefully study both distinguishing and key-recovery attacks against Bluetooth two-level EO given many short frames. Based on a flaw in the resynchronization of Bluetooth EO, we are able to fully exploit the largest bias of the finite state machine inside EO for our attacks. Our key-recovery attack works with 240 simple operations given the first 24 bits of 235 frames. Compared with all existing attacks against two-level EO, this is the best one so far
Type
conference paper
Web of Science ID
WOS:000226132400034
Author(s)
Date Issued
2005
Published in
ASIACRYPT 2004: Advances in Cryptology - ASIACRYPT 2004
Series title/Series vol.
Lecture Notes in Computer Science; 3329
Start page
483
End page
499
Subjects
Editorial or Peer reviewed
REVIEWED
Written at
EPFL
EPFL units
Event name | Event place | Event date |
Jeju Island, South Korea | December 5-9, 2004 | |
Available on Infoscience
January 18, 2007
Use this identifier to reference this record