Cryptanalysis of Bluetooth Keystream Generator Two-Level E0

نویسندگان

  • Yi Lu
  • Serge Vaudenay
چکیده

In this paper, we carefully study both distinguishing and keyrecovery attacks against Bluetooth two-level E0 given many short frames. Based on a flaw in the resynchronization of Bluetooth E0, we are able to fully exploit the largest bias of the finite state machine inside E0 for our attacks. Our key-recovery attack works with 2 simple operations given the first 24 bits of 2 frames. Compared with all existing attacks against two-level E0, this is the best one so far. 1 Background The short-range wireless technology Bluetooth uses the keystream generator E0 to produce the keystream for encryption. After the earlier results [10, 9, 6] of correlation (also called bias) properties inside the Finite State Machine (FSM) towards the one-level E0, most recently, [12] systematically studied the biases and proved two previously known large biases to be the only largest up to 26 consecutive bits of the FSM output sequences. Attacks against E0 mostly focus on one-level E0 only and the best attacks [12, 1, 5] work on one impractically long frame of keystream without exception. Nevertheless, a few attacks [15, 11, 7–9] apply to two-level E0; compared with feasible attack complexities on one-level E0, attack complexities on two-level E0 are extremely high and make the practical Bluetooth E0 unbroken. The main contribution of this paper is that first based on one of the two largest biases inside the FSM within one-level E0, we identify the bias at two-level E0 due to a resynchronization flaw in Bluetooth E0. Unlike the traditional approach to find the bias, the characterized bias does not involve the precomputation of the multiple polynomial with low weight. Second, to utilize the identified bias, we develop a novel attack to directly recover the original encryption key for two-level E0 without reconstructing the initial state of E0 at the second level. Our key-recovery attack works with 2 simple operations given the first 24 bits of 2 frames. Compared with all existing attacks [15, 11, 7–9] against two-level E0, this is the best so far. The rest of the paper is structured as follows. In Section 2 we review description of two-level E0. In Section 3 we study the attack against one-level E0. Then, we investigate the E0 resynchronization flaw, which allows to develop the basic attack of previous section into the distinguishing and key-recovery attacks against two-level E0 in Section 4; we further extend our key-recovery attack in Section 5. Finally, we conclude in Section 6. 2 Preliminaries 2.1 The Core of Bluetooth E0 To briefly outline, the core of E0 (both dashed boxes in Fig. 1) can be viewed as a nonlinear filtering generator. The filtering generator consists of four LFSRs ? supported in part by the National Competence Center in Research on Mobile Information and Communication Systems (NCCR-MICS), a center of the Swiss National Science Foundation under the grant number 5005-67322.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

BDD-Based Cryptanalysis of Keystream Generators

Many of the keystream generators which are used in practice are LFSR-based in the sense that they produce the keystream according to a rule y = C(L(x)), where L(x) denotes an internal linear bitstream, produced by a small number of parallel linear feedback shift registers (LFSRs), and C denotes some nonlinear compression function. We present an n2 time bounded attack, the FBDD-attack, against L...

متن کامل

ZDD-Based Cryptanalysis of E0 Keystream Generator

BDD is an efficient data structure that in last few years has been used effectively in computer science and engineering. BDD-based attack in key stream cryptanalysis is supposed to be one of the best forms of attack in its kind. In this paper, we propose a new key stream attack which is based on ZDD(a variant of BDD). We show how our ZDD-based key stream attack can be used against the E0 type o...

متن کامل

Reducing the Space Complexity of BDD-Based Attacks on Keystream Generators

The main application of stream ciphers is online-encryption of arbitrarily long data, for example when transmitting speech data between a Bluetooth headset and a mobile GSM phone or between the phone and a GSM base station. Many practically used and intensively discussed stream ciphers such as the E0 generator used in Bluetooth and the GSM cipher A5/1 consist of a small number of linear feedbac...

متن کامل

A Uniform Framework for Cryptanalysis of the Bluetooth E0 Cipher

In this paper we analyze the E0 cipher, which is the encryption system used in the Bluetooth specification. We suggest a uniform framework for cryptanalysis of the E0 cipher. Our method requires 128 known bits of the keystream in order to recover the initial state of the LFSRs, which reflects the secret key of this encryption engine. In one setting, our framework reduces to an attack of D. Blei...

متن کامل

Faster Correlation Attack on Bluetooth Keystream Generator E0

We study both distinguishing and key-recovery attacks against E0, the keystream generator used in Bluetooth by means of correlation. First, a powerful computation method of correlations is formulated by a recursive expression, which makes it easier to calculate correlations of the finite state machine output sequences up to 26 bits for E0 and allows us to verify the two known correlations to be...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004