Paper 2005/107

A Uniform Framework for Cryptanalysis of the Bluetooth $E_0$ Cipher

Ophir Levy and Avishai Wool


In this paper we analyze the $E_0$ cipher, which is the encryption system used in the Bluetooth specification. We suggest a uniform framework for cryptanalysis of the $E_0$ cipher. Our method requires 128 known bits of the keystream in order to recover the initial state of the LFSRs, which reflects the secret key of this encryption engine. In one setting, our framework reduces to an attack of D. Bleichenbacher. In another setting, our framework is equivalent to an attack presented by Fluhrer and Lucks. Our best attack can recover the initial state of the LFSRs after solving $2^{86}$ boolean linear systems of equations, which is roughly equivalent to the results obtained by Fluhrer and Lucks.

Available format(s)
Secret-key cryptography
Publication info
Published elsewhere. Unknown where it was published
Contact author(s)
yash @ eng tau ac il
2005-04-14: received
Short URL
Creative Commons Attribution


      author = {Ophir Levy and Avishai Wool},
      title = {A Uniform Framework for Cryptanalysis of the Bluetooth $E_0$ Cipher},
      howpublished = {Cryptology ePrint Archive, Paper 2005/107},
      year = {2005},
      note = {\url{}},
      url = {}
Note: In order to protect the privacy of readers, does not use cookies or embedded third party content.