Loading...
conference paper
Cryptanalysis of Bluetooth Keystream Generator Two-level E0
2005
ASIACRYPT 2004: Advances in Cryptology - ASIACRYPT 2004
In this paper, we carefully study both distinguishing and key-recovery attacks against Bluetooth two-level EO given many short frames. Based on a flaw in the resynchronization of Bluetooth EO, we are able to fully exploit the largest bias of the finite state machine inside EO for our attacks. Our key-recovery attack works with 2<sup>40</sup> simple operations given the first 24 bits of 2<sup>35</sup> frames. Compared with all existing attacks against two-level EO, this is the best one so far
Loading...
Name
YV04b.pdf
Access type
openaccess
Size
185.74 KB
Format
Adobe PDF
Checksum (MD5)
ed869d3a36b688e217817b6e2940bcd5