2005
DOI: 10.1007/11599548_1
|View full text |Cite
|
Sign up to set email alerts
|

On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography

Abstract: Abstract. Despite many good (secure) key agreement protocols based on publickey cryptography exist, secure associations between two wireless devices are often established using symmetric-key cryptography for cost reasons. The consequence is that common daily used security protocols such as Bluetooth pairing are insecure in the sense that an adversary can easily extract the main private key from the protocol communications. Nevertheless, we show that a feature in the Bluetooth standard provides a pragmatic and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2006
2006
2009
2009

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 23 publications
0
3
0
Order By: Relevance
“…Bellare and Rogaway formalised a corresponding security model [3,4] where an adversary can execute several protocol instances concurrently and succeeds in deception if at least one protocol reaches an accepting state with incorrect outputs. The model was later extended to capture security of key agreement protocols [2] and then used in the context of manual authentication [21,20,17,18].…”
Section: Security Of Parallel Compositionsmentioning
confidence: 99%
“…Bellare and Rogaway formalised a corresponding security model [3,4] where an adversary can execute several protocol instances concurrently and succeeds in deception if at least one protocol reaches an accepting state with incorrect outputs. The model was later extended to capture security of key agreement protocols [2] and then used in the context of manual authentication [21,20,17,18].…”
Section: Security Of Parallel Compositionsmentioning
confidence: 99%
“…We adopt the security model from [Vau05,Vau06,PV06] based on the one from Bellare-Rogaway [BR93]. We consider a network of participants which are located at some nodes.…”
Section: Preliminariesmentioning
confidence: 99%
“…The underlining assumption of this protocol is that the adversary is not listening in at least one of each n successive interactions between the Tag and the Verifier. In essence, AP 1 protocol extends the "minimalist" security model in [12] and the assumptions made in [18]. The underlying assumption of AP 1 is that each communication session is atomic.…”
Section: Introductionmentioning
confidence: 99%