Faster correlation attack on bluetooth keystream generator EO

57Citations
Citations of this article
40Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We study both distinguishing and key-recovery attacks against EO, the keystream generator used in Bluetooth by means of correlation. First, a powerful computation method of correlations is formulated by a recursive expression, which makes it easier to calculate correlations of the finite state machine output sequences up to 26 bits for EO and allows us to verify the two known correlations to be the largest for the first time. Second, we apply the concept of convolution to the analysis of the distinguisher based on all correlations, and propose an efficient distinguisher due to the linear dependency of the largest correlations. Last, we propose a novel maximum likelihood decoding algorithm based on fast Walsh transform to recover the closest codeword for any linear code of dimension L and length n. It requires time O(n + L·2 L) and memory imn(n,2L). This can speed up many attacks such as fast correlation attacks. We apply it to EO, and our best key-recovery attack works in 239 time given 239 consecutive bits after O(237) precomputation. This is the best known attack against EO so far. © International Association for Cryptologic Research 2004.

Cite

CITATION STYLE

APA

Lu, Y., & Vaudenay, S. (2004). Faster correlation attack on bluetooth keystream generator EO. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3152, 407–425. https://doi.org/10.1007/978-3-540-28628-8_25

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free