An algebraic attack to the Bluetooth stream cipher E0

01/04/2022
by   Roberto La Scala, et al.
0

In this paper we study the security of the Bluetooth stream cipher E0 from the viewpoint it is a "difference stream cipher", that is, it is defined by a system of explicit difference equations over the finite field GF(2). This approach highlights some issues of the Bluetooth encryption such as the invertibility of its state transition map, a special set of 14 bits of its 132-bit state which when guessed implies linear equations among the other bits and finally a small number of spurious keys, with 83 guessed bits, which are compatible with a keystream of about 60 bits. Exploiting these issues, we implement an algebraic attack using Gröbner bases, SAT solvers and Binary Decision Diagrams. Testing activities suggest that the version based on Gröbner bases is the best one and it is able to attack E0 in about 2^79 seconds on an Intel i9 CPU. To the best of our knowledge, this work improves any previous attack based on a short keystream, hence fitting with Bluetooth specifications.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/07/2023

Security Analysis of WG-7 Lightweight Stream Cipher against Cube Attack

Welch–Gong (WG) is a hardware-oriented LFSR-based stream cipher. WG-7 is...
research
03/28/2020

Stream/block ciphers, difference equations and algebraic attacks

In this paper we model a class of stream and block ciphers as systems of...
research
12/22/2021

An algebraic attack on stream ciphers with application to nonlinear filter generators and WG-PRNG

In this paper, we propose a new algebraic attack on stream ciphers. Star...
research
01/28/2021

GF-Flush: A GF(2) Algebraic Attack on Secure Scan Chains

Scan chains provide increased controllability and observability for test...
research
06/09/2021

Recovering AES Keys with a Deep Cold Boot Attack

Cold boot attacks inspect the corrupted random access memory soon after ...
research
12/07/2021

BDFA: A Blind Data Adversarial Bit-flip Attack on Deep Neural Networks

Adversarial bit-flip attack (BFA) on Neural Network weights can result i...
research
12/21/2021

CryptoMiniSat Switches-Optimization for Solving Cryptographic Instances

Performing hundreds of test runs and a source-code analysis, we empirica...

Please sign up or login with your details

Forgot password? Click here to reset