Firmware Insider: Bluetooth Randomness is Mostly Random

06/30/2020
by   Jörn Tillmanns, et al.
0

Bluetooth chips must include a Random Number Generator (RNG). This RNG is used internally within cryptographic primitives but also exposed to the operating system for chip-external applications. In general, it is a black box with security-critical authentication and encryption mechanisms depending on it. In this paper, we evaluate the quality of RNGs in various Broadcom and Cypress Bluetooth chips. We find that the RNG implementation significantly changed over the last decade. Moreover, most devices implement an insecure Pseudo-Random Number Generator (PRNG) fallback. Multiple popular devices, such as the Samsung Galaxy S8 and its variants as well as an iPhone, rely on the weak fallback due to missing a Hardware Random Number Generator (HRNG). We statistically evaluate the output of various HRNGs in chips used by hundreds of millions of devices. While the Broadcom and Cypress HRNGs pass advanced tests, it remains indistinguishable for users if a Bluetooth chip implements a secure RNG without an extensive analysis as in this paper. We describe our measurement methods and publish our tools to enable further public testing.

READ FULL TEXT
research
06/14/2018

Towards Implementation of Robust and Low-Cost Security Primitives for Resource-Constrained IoT Devices

In recent years, due to the trend in globalization, system integrators h...
research
11/07/2022

Hardware Security Primitives using Passive RRAM Crossbar Array: Novel TRNG and PUF Designs

With rapid advancements in electronic gadgets, the security and privacy ...
research
11/08/2022

Computational indistinguishability and boson sampling

We introduce a computational problem of distinguishing between the outpu...
research
03/08/2022

A Fast Hardware Pseudorandom Number Generator Based on xoroshiro128

The Graphcore Intelligent Processing Unit contains an original pseudoran...
research
10/27/2018

A New Cryptographic Approach: Iterated Random Encryption (IRE)

A new cryptographic approach -- Iterated Random Encryption (IRE) -- is p...
research
06/17/2020

Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets

Wireless communication standards and implementations have a troubled his...

Please sign up or login with your details

Forgot password? Click here to reset