A general linear iterative cryptanalysis methodfor solving binary systems of approximate linear equations which is also applicable to keystream generators producing short keystream sequences is proposed. A linear cryptanalysis method for reconstructing the secret key in a general type of initialization schemes is also developed. A large class of linear correlations in the Bluetooth combiner, unconditioned or conditionedon the output or on both the output andone input, are found andc haracterized. As a result, an attack on the Bluetooth stream cipher that can reconstruct the 128-bit secret key with complexity about 270 from about 45 initializations is proposed. In the precomputation stage, a database of about 280 103-bit words has to be sorted out. © 2002 Springer-Verlag Berlin Heidelberg.
CITATION STYLE
Golić, J. D., Bagini, V., & Morgari, G. (2002). Linear cryptanalysis of bluetooth stream cipher. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2332, 238–255. https://doi.org/10.1007/3-540-46035-7_16
Mendeley helps you to discover research relevant for your work.