Key negotiation downgrade attacks on bluetooth and bluetooth low energy
Bluetooth (BR/EDR) and Bluetooth Low Energy (BLE) are pervasive wireless technologies specified in the Bluetooth standard. The standard includes key negotiation protocols used to generate long-term keys (during pairing) and session keys (during secure connection establishment). In this work, we demonstrate that the key negotiation protocols of Bluetooth and BLE are vulnerable to standard-compliant entropy downgrade attacks. In particular, we show how an attacker can downgrade the entropy of a...Expand abstract
- Publication status:
- Peer review status:
- Peer reviewed
- Copyright holder:
- Antonioli et al.
- Copyright date:
- Rights statement:
- © 2020 Copyright held by the owner/author(s). Publication rights licensed to ACM.
- This is the accepted manuscript version of the article. The final version is available online from the Association for Computing Machinery at: https://doi.org/10.1145/3394497
If you are the owner of this record, you can report an update to it here: Report update to this record