Bluetooth Security Soh Kok Hong CTO March 29, 2003 - PowerPoint PPT Presentation

1 / 14
About This Presentation
Title:

Bluetooth Security Soh Kok Hong CTO March 29, 2003

Description:

It is peer-to-peer non-line-of-sight wireless link ... Generate stream cipher which is XOR with data stream after CRC bits are added ... – PowerPoint PPT presentation

Number of Views:57
Avg rating:3.0/5.0
Slides: 15
Provided by: kokh
Category:
Tags: cto | bluetooth | cipher | hong | kok | march | security | soh

less

Transcript and Presenter's Notes

Title: Bluetooth Security Soh Kok Hong CTO March 29, 2003


1
Bluetooth SecuritySoh Kok HongCTOMarch 29,
2003
2
Bluetooth Overview
  • It is peer-to-peer non-line-of-sight wireless
    link
  • It is short-range 10 m (Class 3) to 100 m
    (Class 1)
  • Operates at ISM band at 2.4 GHz
  • Frequency hopping
  • Symbol Rate 1 Ms/s
  • Full-duplex TDD with 625 usec slots
  • Can have asynchronous and synchronous channels

3
Security Overview
  • Link-layer authentication and encryption
    procedures
  • Key management procedures
  • Profile definitions ensure that certain types
    applications meet the typical security
    requirements expected
  • Three phases to obtain a secure link
  • Bonding
  • Authentication
  • Encryption

4
Security Entities
  • Unique Bluetooth Device Address (BD_ADDR) is a
    48-bit IEEE address
  • Private link key (for authentication) 128 bits
  • Private encryption key 8 to 128 bits
  • Random number generator 128 bits

5
Key management
  • Types of link keys
  • Initialization key Kinit
  • Unit key KA semi-permanent
  • Combination key KAB semi-permanent
  • Temporary key Kmaster

6
Generating Kinit
  • E22(RAND, PIN, L) ? Kinit
  • PIN PIN0L-1 U BD_ADDR0min5, 15-L, L
    lt 16
  • PIN PIN0L-1, L 16
  • L min16, L6

7
Generating KAB
8
Generating KAB (contd)
9
Authentication
  • Generally, 2-way authentication is used.

10
Authentication (contd)
11
Encryption key
  • E3(link key, RAND, COF) ? Encryption key

12
Encryption key (contd)
13
Encryption
  • Generate stream cipher which is XOR with data
    stream after CRC bits are added and before FEC
    encoding

14
Encryption (contd)
  • Encryption engine
Write a Comment
User Comments (0)
About PowerShow.com