Cryptology ePrint Archive: Report 2006/303
Zero-knowledge-like Proof of Cryptanalysis of Bluetooth Encryption
Eric Filiol
Abstract: This paper presents a protocol aiming at proving that an encryption system contains structural weaknesses
without disclosing any information on those weaknesses. A verifier can check in a polynomial time that
a given property of the cipher system output has been effectively realized. This property has been chosen
by the prover in such a way that it cannot been achieved by known attacks or exhaustive search but only if the
prover indeed knows some unknown weaknesses that may effectively endanger the cryptosystem security. This protocol
has been denoted {\em zero-knowledge-like proof
of cryptanalysis}. In this paper, we apply this protocol to the Bluetooth core encryption algorithm E0, used in
many mobile environments and thus we prove that its security can seriously be put into question.
Category / Keywords: secret-key cryptography / cryptanalysis - stream ciphers - zero knowledge
Publication Info: Published in the International Journal in Information Technology
Date: received 3 Sep 2006, last revised 29 Apr 2007
Contact author: Eric Filiol at inria fr
Available format(s): Postscript (PS) | Compressed Postscript (PS.GZ) | BibTeX Citation
Note: This paper has been published in the International Journal in Information Technology, Volume 3, Issue 4, pp. 285 -- 293 and is available at http://www.waset.org/ijit/v3.html
A few significant data have been added into the Appendix.
Version: 20070429:164925 (All versions of this report)
Short URL: ia.cr/2006/303
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]