Although this attack is of no advantage if \(E_{0}\) is used with the recommended security parameters (64 bit encryption key), it shows that no addition security would be made available by enlarging the encryption key, as discussed in the Bluetooth specification.
Category / Keywords: secret-key cryptography / Bluetooth E0 cryptanalysis Date: received 2 Jun 2002 Contact author: sfluhrer at cisco com Available format(s): Postscript (PS) | Compressed Postscript (PS.GZ) | BibTeX Citation Note: This is a rough first draft. The exposition could be much improved, and I haven't bothered to define all the variables used within the algorithm (although they should be obvious). I intend to revise this shortly. Version: 20020603:183852 (All versions of this report) Short URL: ia.cr/2002/068 Discussion forum: Show discussion | Start new discussion