Paper 2002/191

A Linearization Attack on the Bluetooth Key Stream Generator

Frederik Armknecht

Abstract

In this paper we propose an attack on the key stream generator underlying the encryption system $E_0$ used in the Bluetooth specification. We show that the initial value can be recovered by solving a system of nonlinear equations of degree 4 over the finite field GF(2). This system of equations can be transformed by linearization into a system of linear equations with at most $2^{24.056}$ unknowns. To our knowledge, this is the best attack on the key stream generator underlying the $\mbox{E}_0$ yet.

Metadata
Available format(s)
PS
Category
Secret-key cryptography
Publication info
Published elsewhere. Unknown where it was published
Keywords
stream cipherBluetoothlinearization attackXL algorithmXSL algorithm
Contact author(s)
armknecht @ th informatik uni-mannheim de
History
2003-08-13: revised
2002-12-17: received
See all versions
Short URL
https://ia.cr/2002/191
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2002/191,
      author = {Frederik Armknecht},
      title = {A Linearization Attack on the Bluetooth Key Stream Generator},
      howpublished = {Cryptology ePrint Archive, Paper 2002/191},
      year = {2002},
      note = {\url{https://eprint.iacr.org/2002/191}},
      url = {https://eprint.iacr.org/2002/191}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.