International Association for Cryptologic Research

International Association
for Cryptologic Research

IACR News item: 27 May 2013

Tomas Rosa
ePrint Report ePrint Report
This memo describes new cryptographic weakness of the passkey-based pairing of Bluetooth Low Energy (also known as Bluetooth Smart). The vulnerability discussed here extends the set of possible attacking scenarios that were already elaborated before by Mike Ryan at Shmoocon 2013.

Instead of the passive sniffing attack on pairing secrets, we show how an active fraudulent Responder can gracefully bypass passkey authentication, despite it being possibly based on even one-time generated PIN.

Expand

Additional news items may be found on the IACR news page.