On bluetooth repairing: Key agreement based on symmetric-key cryptography

4Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Despite many good (secure) key agreement protocols based on public-key cryptography exist, secure associations between two wireless devices are often established using symmetric-key cryptography for cost reasons. The consequence is that common daily used security protocols such as Bluetooth pairing are insecure in the sense that an adversary can easily extract the main private key from the protocol communications. Nevertheless, we show that a feature in the Bluetooth standard provides a pragmatic and costless protocol that can eventually repair privateless associations, thanks to mobility. This proves (in the random oracle model) the pragmatic security of the Bluetooth pairing protocol when repairing is used. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Vaudenay, S. (2005). On bluetooth repairing: Key agreement based on symmetric-key cryptography. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3822 LNCS, pp. 1–9). Springer Verlag. https://doi.org/10.1007/11599548_1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free