Cryptology ePrint Archive: Report 2006/072
Cryptanalysis of the Bluetooth E0 Cipher using OBDD's
Yaniv Shaked and Avishai Wool
Abstract: In this paper we analyze the E0 cipher, which is the cipher used
in the Bluetooth specifications. We adapted and optimized the Binary
Decision Diagram attack of Krause, for the specific details of
E0. Our method requires 128 known bits of the keystream in order
to recover the initial value of the four LFSR's in the E0 system.
We describe several variants which we built to lower the complexity
of the attack. We evaluated our attack against the real
(non-reduced) E0 cipher. Our best attack can recover the initial
value of the four LFSR's, for the first time, with a realistic space
complexity of 2^23 (84MB RAM), and with a time complexity of
2^87. This attack can be massively parallelized to
lower the overall time complexity. Beyond the
specifics of E0, our work describes practical experience with
BDD-based cryptanalysis, which so far has mostly been a theoretical
concept.
Category / Keywords: secret-key cryptography / Stream cipher, Cryptanalysis, Bluetooth, BDD
Date: received 22 Feb 2006, last revised 27 Mar 2006
Contact author: yash at eng tau ac il
Available format(s): PDF | BibTeX Citation
Version: 20060327:094614 (All versions of this report)
Short URL: ia.cr/2006/072
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]