A uniform framework for cryptanalysis of the Bluetooth e0 cipher

Ophir Levy*, Avishai Wool

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Scopus citations

Abstract

In this paper we analyze the E0 cipher, which is the encryption system used in the Bluetooth specification. We suggest a uniform framework for cryptanalysis of the E0 cipher. Our method requires 128 known bits of the keystream in order to recover the initial state of the LFSRs, which reflects the secret key of this encryption engine. In one setting, our framework reduces to an attack of D. Bleichenbacher. In another setting, our framework is equivalent to an attack presented by Fluhrer and Lucks. Our best attack can recover the initial state of the LFSRs after solving 286 boolean linear systems of equations, which is roughly equivalent to the results obtained by Fluhrer and Lucks.

Original languageEnglish
Title of host publicationProceedings - First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005
Pages365-373
Number of pages9
DOIs
StatePublished - 2005
Event1st International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005 - Athens, Greece
Duration: 5 Sep 20059 Sep 2005

Publication series

NameProceedings - First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005
Volume2005

Conference

Conference1st International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005
Country/TerritoryGreece
CityAthens
Period5/09/059/09/05

Fingerprint

Dive into the research topics of 'A uniform framework for cryptanalysis of the Bluetooth e0 cipher'. Together they form a unique fingerprint.

Cite this