Cryptology ePrint Archive: Report 2021/1597

Cryptographic Analysis of the Bluetooth Secure Connection Protocol Suite

Marc Fischlin and Olga Sanina

Abstract: We give a cryptographic analysis of the Bluetooth Secure Connections Protocol Suite. Bluetooth supports several subprotocols, such as Numeric Comparison, Passkey Entry, and Just Works, in order to match the devices' different input/output capabilities. Previous analyses (e.g., Lindell, CT-RSA'09, or Troncoso and Hale, NDSS'21) often considered (and confirmed) the security of single subprotocols only. Recent practically verified attacks, however, such as the Method Confusion Attack (von Tschirschnitz et al., S&P'21) against Bluetooth's authentication and key secrecy property, often exploit the bad interplay of different subprotocols. Even worse, some of these attacks demonstrate that one cannot prove the Bluetooth protocol suite to be a secure authenticated key exchange protocol. We therefore aim at the best we can hope for and show that the protocol still matches the common key secrecy requirements of a key exchange protocol if one assumes a trust-on-first-use (TOFU) relationship. This means that the adversary needs to mount an active attack during the initial connection, otherwise the subsequent reconnections remain secure. Investigating the cryptographic strength of the Bluetooth protocol, we also look into the privacy mechanism of address randomization in Bluetooth (which is only available in the Low Energy version). We show that the cryptography indeed provides a decent level of address privacy, although this does not rule out identification of devices via other means, such as physical characteristics.

Category / Keywords: cryptographic protocols / Bluetooth, Key Exchange, Trust On First Use (TOFU), Privacy, Secure Connections

Original Publication (with minor differences): IACR-ASIACRYPT-2021
DOI:
10.1007/978-3-030-92075-3_24

Date: received 6 Dec 2021

Contact author: marc fischlin at cryptoplexity de, olga sanina at cryptoplexity de

Available format(s): PDF | BibTeX Citation

Version: 20211209:031030 (All versions of this report)

Short URL: ia.cr/2021/1597


[ Cryptology ePrint archive ]