...
首页> 外文期刊>ACM transactions on privacy and security >Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy
【24h】

Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy

机译:关键谈判降级攻击蓝牙和蓝牙低能量

获取原文
获取原文并翻译 | 示例

摘要

Bluetooth (BR/EDR) and Bluetooth Low Energy (BLE) are pervasive wireless technologies specified in the Bluetooth standard. The standard includes key negotiation protocols used to generate long-term keys (during pairing) and session keys (during secure connection establishment). In this work, we demonstrate that the key negotiation protocols of Bluetooth and BLE are vulnerable to standard-compliant entropy downgrade attacks. In particular, we show how an attacker can downgrade the entropy of any Bluetooth session key to 1 byte, and of any BLE long-term key and session key to 7 bytes. Such low entropy values enable the attacker to brute-force Bluetooth long-term keys and BLE long-term and session keys, and to break all the security guarantees promised by Bluetooth and BLE. As a result of our attacks, an attacker can decrypt all the ciphertext and inject valid ciphertext in any Bluetooth and BLE network.Our key negotiation downgrade attacks are conducted remotely, do not require access to the victims' devices, and are stealthy to the victims. As the attacks are standard-compliant, they are effective regardless of the usage of the strongest Bluetooth and BLE security modes (including Secure Connections), the Bluetooth version, and the implementation details of the devices used by the victims. We successfully attack 38 Bluetooth devices (32 unique Bluetooth chips) and 19 BLE devices from different vendors, using all the major versions of the Bluetooth standard. Finally, we present effective legacy compliant and non-legacy compliant countermeasures to mitigate our key negotiation downgrade attacks.
机译:蓝牙(BR / EDR)和蓝牙低能量(BLE)是蓝牙标准中指定的普遍无线技术。该标准包括用于生成长期键(在配对期间)和会话键(在安全连接建立期间)的关键协商协议。在这项工作中,我们证明了蓝牙和BLE的关键协商协议容易受标准符合标准的熵降级攻击。特别是,我们展示攻击者如何将任何蓝牙会话密钥的熵降级为1字节,以及任何BLE长期键和会话密钥到7个字节。这种低熵值使攻击者能够向Brute-Force蓝牙长期键和BLE长期和会话键,并打破Bluetooth和BLE承诺的所有安全保证。由于我们的攻击,攻击者可以在任何蓝牙和BLE网络中解密所有密文和注入有效的密文。远程进行关键协商降级攻击,不需要访问受害者的设备,并且对受害者隐秘是隐秘的。由于攻击符合标准符合标准标准,无论使用最强的蓝牙和BLE安全模式(包括安全连接),蓝牙版本以及受害者所使用的设备的实现细节,它们都是有效的。我们使用蓝牙标准的所有主要版本成功地攻击了38个蓝牙设备(32个唯一蓝牙芯片)和19个BLE设备。最后,我们提出了有效的遗留符合条件和非遗留的符合对策,以减轻我们的关键谈判降级攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号