Cryptanalysis of Bluetooth Keystream Generator Two-level E0

In this paper, we carefully study both distinguishing and key-recovery attacks against Bluetooth two-level EO given many short frames. Based on a flaw in the resynchronization of Bluetooth EO, we are able to fully exploit the largest bias of the finite state machine inside EO for our attacks. Our key-recovery attack works with 2<sup>40</sup> simple operations given the first 24 bits of 2<sup>35</sup> frames. Compared with all existing attacks against two-level EO, this is the best one so far


Published in:
The 10th International Conference on the Theory and Application of Cryptology and Information Security, Advances in Cryptology, ASIACRYPT 2004, 3329, 483-499
Presented at:
The 10th International Conference on the Theory and Application of Cryptology and Information Security, Advances in Cryptology, ASIACRYPT 2004, Jeju Island, South Korea, December 5-9, 2004
Year:
2005
Keywords:
Other identifiers:
Laboratories:




 Record created 2007-01-18, last modified 2018-03-17

n/a:
Download fulltextPDF
External link:
Download fulltextURL
Rate this document:

Rate this document:
1
2
3
 
(Not yet reviewed)