Cryptanalysis of Bluetooth Keystream Generator Two-level E0
In this paper, we carefully study both distinguishing and key-recovery attacks against Bluetooth two-level EO given many short frames. Based on a flaw in the resynchronization of Bluetooth EO, we are able to fully exploit the largest bias of the finite state machine inside EO for our attacks. Our key-recovery attack works with 2<sup>40</sup> simple operations given the first 24 bits of 2<sup>35</sup> frames. Compared with all existing attacks against two-level EO, this is the best one so far
Published in:
The 10th International Conference on the Theory and Application of Cryptology and Information Security, Advances in Cryptology, ASIACRYPT 2004, 3329, 483-499
Presented at:
The 10th International Conference on the Theory and Application of Cryptology and Information Security, Advances in Cryptology, ASIACRYPT 2004, Jeju Island, South Korea, December 5-9, 2004
Keywords:
Laboratories:
Record created 2007-01-18, last modified 2018-03-17