Cryptanalysis of Bluetooth Keystream Generator Two-Level E0

@inproceedings{Lu2004CryptanalysisOB,
  title={Cryptanalysis of Bluetooth Keystream Generator Two-Level E0},
  author={Yi Lu and Serge Vaudenay},
  booktitle={ASIACRYPT},
  year={2004}
}
In this paper, we carefully study both distinguishing and keyrecovery attacks against Bluetooth two-level E0 given many short frames. Based on a flaw in the resynchronization of Bluetooth E0, we are able to fully exploit the largest bias of the finite state machine inside E0 for our attacks. Our key-recovery attack works with 2 simple operations given the first 24 bits of 2 frames. Compared with all existing attacks against two-level E0, this is the best one so far. 1 Background The short-range… CONTINUE READING
27 Citations
12 References
Similar Papers

References

Publications referenced by this paper.
Showing 1-10 of 12 references

Some Results on Correlations in the Bluetooth Stream Cipher

  • Patrik Ekdahl, Thomas Johansson
  • Proceedings of the 10th Joint Conference on…
  • 2000
2 Excerpts

Correlation Properties of the Bluetooth Combiner

  • Òóøø Ý Ü Ø Ò Ò¹¹¹ññò××óòòð Ú Blockinøóö Ò ´¾ Ò Μ × Ü Ø, Ììì Òòòö, Ôöóù Blockinø, Øûò Øûó Ú Blockinøóö× Û ´û ½ Û ¾ Û Ò Μ Òò Ü ´ü ½ Ü
  • 1999
1 Excerpt

Similar Papers

Loading similar papers…