Paper 2002/191
A Linearization Attack on the Bluetooth Key Stream Generator
Frederik Armknecht
Abstract
In this paper we propose an attack on the key stream generator underlying the encryption system $E_0$ used in the Bluetooth specification. We show that the initial value can be recovered by solving a system of nonlinear equations of degree 4 over the finite field GF(2). This system of equations can be transformed by linearization into a system of linear equations with at most $2^{24.056}$ unknowns. To our knowledge, this is the best attack on the key stream generator underlying the $\mbox{E}_0$ yet.
Metadata
- Available format(s)
- PS
- Category
- Secret-key cryptography
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- stream cipherBluetoothlinearization attackXL algorithmXSL algorithm
- Contact author(s)
- armknecht @ th informatik uni-mannheim de
- History
- 2003-08-13: revised
- 2002-12-17: received
- See all versions
- Short URL
- https://ia.cr/2002/191
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2002/191, author = {Frederik Armknecht}, title = {A Linearization Attack on the Bluetooth Key Stream Generator}, howpublished = {Cryptology {ePrint} Archive, Paper 2002/191}, year = {2002}, url = {https://eprint.iacr.org/2002/191} }