首页> 外文会议>International Conference on Selected Areas in Cryptography >Breaking the Bluetooth Pairing - The Fixed Coordinate Invalid Curve Attack
【24h】

Breaking the Bluetooth Pairing - The Fixed Coordinate Invalid Curve Attack

机译:打破蓝牙配对 - 固定坐标无效曲线攻击

获取原文
获取外文期刊封面目录资料

摘要

Bluetooth is a widely deployed standard for wireless communications between mobile devices. It uses authenticated Elliptic Curve Diffie-Hellman for its key exchange. In this paper we show that the authentication provided by the Bluetooth pairing protocols is insufficient and does not provide the promised MitM protection. We present a new attack that modifies the y-coordinates of the public keys (while preserving the x-coordinates). The attack compromises the encryption keys of all of the current Bluetooth authenticated pairing protocols, provided both paired devices are vulnerable. Specifically, it successfully compromises the encryption keys of 50% of the Bluetooth pairing attempts, while in the other 50% the pairing of the victims is terminated. The affected vendors have been informed and patched their products accordingly, and the Bluetooth specification had been modified to address the new attack. We named our new attack the "Fixed Coordinate Invalid Curve Attack". Unlike the well known "Invalid Curve Attack" of Biehl et al. [2] which recovers the private key by sending multiple specially crafted points to the victim, our attack is a MitM attack which modifies the public keys in a way that lets the attacker deduce the shared secret.
机译:蓝牙是移动设备之间的广泛部署的无线通信标准。它使用经过身份验证的椭圆曲线Diffie-Hellman进行关键交换。在本文中,我们表明,蓝牙配对协议提供的认证不足,不提供承诺的MITM保护。我们提出了一种修改公钥的Y坐标的新攻击(在保留X坐标时)。该攻击损害了所有当前蓝牙经过验证的配对协议的加密密钥,提供了两个配对设备易受攻击。具体而言,它成功地损害了蓝牙配对尝试的50%的加密键,而在其他50%中终止了受害者的配对。受影响的供应商已被告知和修补其产品,并修改了蓝牙规范以解决新攻击。我们将新攻击命名为“固定坐标无效曲线攻击”。与Biehl等人的众所周知的“无效曲线攻击”不同。 [2]通过向受害者发送多个特制点来恢复私钥,我们的攻击是一种麻省理工验管理攻击,以允许攻击者推断共享秘密的方式修改公钥攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号