Cracking the Bluetooth PIN

被引:58
作者
Shaked, Y [1 ]
Wool, A [1 ]
机构
[1] Tel Aviv Univ, Sch Elect Engn Syst, IL-69978 Tel Aviv, Israel
来源
Proceedings of the Third International Conference on Mobile Systems, Applications, and Services (MobiSys 2005) | 2005年
关键词
D O I
10.1145/1067170.1067176
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This paper describes the implementation of an attack on the Bluetooth security mechanism. Specifically, we describe a passive attack, in which an attacker can find the PIN used during the pairing process. We then describe the cracking speed we can achieve through three optimizations methods. Our fastest optimization employs an algebraic representation of a central cryptographic primitive (SAFER+) used in Bluetooth. Our results show that a 4-digit PIN can be cracked in less than 0.3 sec on an old Pentium III 450MHz computer, and in 0.06 sec on a Pentium IV 3Ghz HT computer.
引用
收藏
页码:39 / 50
页数:12
相关论文
共 12 条
[1]  
ARMKNECHT F, LINEARIZATION ATTACK
[2]  
FLUHRER S, IMPROVED KEY RECOVER
[3]  
FLUHRER S, 2001, LNCS, V2259
[4]  
HERMELIN M, 1999, LNCS, V1187, P17
[5]  
Jakobsson M, 2001, LECT NOTES COMPUT SC, V2020, P176
[6]  
KRAUSE M, 2002, LNCS, V1462, P222
[7]  
LAURIE A, SERIOUS FLAWS BLUETO
[8]  
LEVY O, 2005, UNIFORM FRAMEWORK CR
[9]  
Lu Y, 2004, LECT NOTES COMPUT SC, V3152, P407
[10]  
Massey J. L., 1998, P 1 ADV ENCR STAND C