Abstract
We study both distinguishing and key-recovery attacks against EO, the keystream generator used in Bluetooth by means of correlation. First, a powerful computation method of correlations is formulated by a recursive expression, which makes it easier to calculate correlations of the finite state machine output sequences up to 26 bits for EO and allows us to verify the two known correlations to be the largest for the first time. Second, we apply the concept of convolution to the analysis of the distinguisher based on all correlations, and propose an efficient distinguisher due to the linear dependency of the largest correlations. Last, we propose a novel maximum likelihood decoding algorithm based on fast Walsh transform to recover the closest codeword for any linear code of dimension L and length n. It requires time O(n + L·2 L) and memory imn(n,2L). This can speed up many attacks such as fast correlation attacks. We apply it to EO, and our best key-recovery attack works in 239 time given 239 consecutive bits after O(237) precomputation. This is the best known attack against EO so far. © International Association for Cryptologic Research 2004.
Cite
CITATION STYLE
Lu, Y., & Vaudenay, S. (2004). Faster correlation attack on bluetooth keystream generator EO. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3152, 407–425. https://doi.org/10.1007/978-3-540-28628-8_25
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.