TY - GEN
T1 - Cracking the Bluetooth PIN
AU - Shaked, Yaniv
AU - Wool, Avishai
PY - 2005
Y1 - 2005
N2 - This paper describes the implementation of an attack on the Bluetooth security mechanism. Specifically, we describe a passive attack, in which an attacker can find the PIN used during the pairing process. We then describe the cracking speed we can achieve through three optimizations methods. Our fastest optimization employs an algebraic representation of a central cryptographic primitive (SAFER+) used in Bluetooth. Our results show that a 4-digit PIN can be cracked in less than 0.3 sec on an old Pentium III 450MHz computer, and in 0.06 sec on a Pentium IV 3Ghz HT computer.
AB - This paper describes the implementation of an attack on the Bluetooth security mechanism. Specifically, we describe a passive attack, in which an attacker can find the PIN used during the pairing process. We then describe the cracking speed we can achieve through three optimizations methods. Our fastest optimization employs an algebraic representation of a central cryptographic primitive (SAFER+) used in Bluetooth. Our results show that a 4-digit PIN can be cracked in less than 0.3 sec on an old Pentium III 450MHz computer, and in 0.06 sec on a Pentium IV 3Ghz HT computer.
UR - http://www.scopus.com/inward/record.url?scp=77953838402&partnerID=8YFLogxK
U2 - 10.1145/1067170.1067176
DO - 10.1145/1067170.1067176
M3 - ???researchoutput.researchoutputtypes.contributiontobookanthology.conference???
AN - SCOPUS:77953838402
SN - 1931971315
SN - 9781931971317
T3 - Proceedings of the 3rd International Conference on Mobile Systems, Applications, and Services, MobiSys 2005
SP - 39
EP - 50
BT - Proceedings of the 3rd International Conference on Mobile Systems, Applications, and Services, MobiSys 2005
T2 - 3rd International Conference on Mobile Systems, Applications, and Services, MobiSys 2005
Y2 - 6 June 2005 through 8 June 2005
ER -