On Bluetooth repairing: key agreement based on symmetric-key cryptography

Despite many good (secure) key agreement protocols based on public-key cryptography exist, secure associations between two wireless devices are often established using symmetric-key cryptography for cost reasons. The consequence is that common daily used security protocols such as Bluetooth pairing are insecure in the sense that an adversary can easily extract the main private key from the protocol communications. Nevertheless, we show that a feature in the Bluetooth standard provides a pragmatic and costless protocol that can eventually repair privateless associations, thanks to mobility. This proves (in the random oracle model) the pragmatic security of the Bluetooth pairing protocol when repairing is used


Published in:
First SKLOIS Conference on Information Security and Cryptology, CISC '05, 3822, 1-9
Presented at:
First SKLOIS Conference on Information Security and Cryptology, CISC '05, Beijing, China, December 15-17, 2005
Year:
2005
Other identifiers:
Laboratories:




 Record created 2007-01-18, last modified 2018-03-17

n/a:
Download fulltextPDF
External link:
Download fulltextURL
Rate this document:

Rate this document:
1
2
3
 
(Not yet reviewed)