[11677] in cryptography@c2.net mail archive
Re: bluetooth cryptosystems
daemon@ATHENA.MIT.EDU (Vin McLellan)
Wed Sep 18 09:24:33 2002
Date: Wed, 18 Sep 2002 03:36:33 -0400
From: Vin McLellan <vin@shore.net>
To: cryptography@wasabisystems.com
In-Reply-To: <874rcoi1om.fsf@snark.piermont.com>
Perry asked:
>Does anyone have good pointers to papers on the security of E0 and the
>rest of the stuff used in bluetooth? It all looks very fragile.
Yes and yes. Schneier once described Bluetooth as "an eavesdropper's=
dream."
As you did into this, Perry, you might also want to keep an eye on the=20
evolving draft standards for IEEE 802.15 (Wireless Personal Area Networks),=
=20
where the consumer electronics giants have apparently demanded a more=20
robust security architecture for the next generation of high-speed=20
low-power piconets. See: http://ieee802.org/15/index.html
My Bluetooth reference file, fyi;-)
Thomas G. Xydis, Simon Blake-Wilson, Bluetooth Security Experts Group -=20
Feb., 2002
"Security Comparison: Bluetooth Communications vs. 802.11."
http://www.bluetooth.com/upload/14Bluetooth_wifi_security.pdf
Bluetooth SIG Security Expert Group
"Bluetooth Security White Paper," 4/19/02
<http://www.bluetooth.com/upload/24Security__Paper.PDF>
Cathal McDaid, 2001
Bluetooth Security, Parts 1, 2, & 3 (Evaluation)
http://www.palowireless.com/bluearticles/cc2_security3.asp
http://www.palowireless.com/bluearticles/cc2_security2.asp
http://www.palowireless.com/bluearticles/cc1_security1.asp
Thomas M=FCller
Bluetooth Security Architecture, 1999
<http://www.bluetooth.com/developer/download/download.asp?doc=3D174>
M. Jakobsson and S. Wetzel
"Security Weaknesses in Bluetooth"
<http:// www. rsasecurity. com/ rsalabs/ staff/ bios/ mjakobsson/=20
bluetooth/ bluetooth.pdf>
S. Fluhrer and S. Lucks
"Analysis of the E0 Encryption System"
<http:// th. informatik. uni-mannheim. de/ People/ Lucks/ papers/ e0. ps.=
gz>
Tr=E4skb=E4ck M,
Security in Bluetooth: An overview of Bluetooth security, 2000-11-2
<http://www.cs.hut.fi/Opinnot/Tik-86.174/Bluetooth_Security.pdf>
Ullgren T.
Security in Bluetooth: Key management in Bluetooth
<http://www.cs.hut.fi/Opinnot/Tik-86.174/sectopics.html>
B. Miller
"IEEE 802.11 and Bluetooth wireless technology"
<http:// www-106. ibm. com/ developerworks/ wireless/ library/ wi-phone/>
Vainio J.,
Bluetooth Security, 2000
<http://www.niksula.cs.hut.fi/~jiitv/bluesec.html>
Hope these are helpful.
Suerte,
_Vin
* Vin McLellan + The Privacy Guild + <vin@shore.net> *
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com