180 likes | 334 Views
Ain Shams University Faculty of Engineering. Integrated Circuits Lab. Bluetooth Security. Presented by: Mohammed Abdelsattar Ismail Sameh Talal Magd-El-Din Sameh Assem Ibrahim Ahmed Abdelhamid Saleh. -Overview -Blocks used -Weakness -Authentication -E 1 algorithm -Key handling
E N D
Ain Shams University Faculty of Engineering Integrated Circuits Lab Bluetooth Security Presented by: Mohammed Abdelsattar Ismail Sameh Talal Magd-El-Din Sameh Assem Ibrahim Ahmed Abdelhamid Saleh
-Overview -Blocks used -Weakness -Authentication -E1algorithm -Key handling -E3 -E2 -SAFER+ -Round -Key Schedule -Implementation -Encryption -modes -Key Reduction -Engine (E0) -Timing -PRNG Authentication Encryption • Challenge-Response Scheme • SAFER+ • Needed for encryption • Optional • Symmetric Stream Cipher • Negotiable Key Size • (8-128 bits)
PIN or Random Number Random number E2 E22 E21 Link Keys Kunit or Kcombination Kinit or Kmaster E1 Authentication Encryption E3 Kcipher E0 Kc -Overview -Blocks used -Weakness -Authentication -E1algorithm -Key handling -E3 -E2 -SAFER+ -Round -Key Schedule -Implementation -Encryption -modes -Key Reduction -Engine (E0) -Timing -PRNG
-Overview -Blocks used -Weakness -Authentication -E1algorithm -Key handling -E3 -E2 -SAFER+ -Round -Key Schedule -Implementation -Encryption -modes -Key Reduction -Engine (E0) -Timing -PRNG • PIN Number • Initialization Key • Unit Key • User Tracking
Challenge-Response Scheme: -Overview -Blocks used -Weakness -Authentication -E1algorithm -Key handling -E3 -E2 -SAFER+ -Round -Key Schedule -Implementation -Encryption -modes -Key Reduction -Engine (E0) -Timing -PRNG
The authentication function E1: -Overview -Blocks used -Weakness -Authentication -E1algorithm -Key handling -E3 -E2 -SAFER+ -Round -Key Schedule -Implementation -Encryption -modes -Key Reduction -Engine (E0) -Timing -PRNG
E3-Key generation function for encryption: -Overview -Blocks used -Weakness -Authentication -E1algorithm -Key handling -E3 -E2 -SAFER+ -Round -Key Schedule -Implementation -Encryption -modes -Key Reduction -Engine (E0) -Timing -PRNG
2)E22 mode: # Utilized when creating initialization key and master key. #It also uses the function A’r . 1)E21 mode: # Utilized when creating unit key and combination key. #It uses the function A’r . E2-Key generation function for authentication: It has two modes of operation: -Overview -Blocks used -Weakness -Authentication -E1algorithm -Key handling -E3 -E2 -SAFER+ -Round -Key Schedule -Implementation -Encryption -modes -Key Reduction -Engine (E0) -Timing -PRNG
Secure and Fast Encryption Routine • SAFER K-64 (1993) - Cylink Corporation • James L. Massay of ETH Zurich • SAFER+ was submitted as one of the candidates to AES 1998 • Block size = 128 bits, key size = 128 , 192 or 256 bits • Bluetooth: Ar & Ar‘ • 128 bits block, 128 bits key, 8 rounds, Encryption only -Overview -Blocks used -Weakness -Authentication -E1algorithm -Key handling -E3 -E2 -SAFER+ -Round -Key Schedule -Implementation -Encryption -modes -Key Reduction -Engine (E0) -Timing -PRNG Plaintext Block (16 bytes) 2 16-Byte round subkeys Encryption Round 1 2 16-Byte round subkeys Encryption Round 8 Output Transformation 1 16-Byte subkey Ciphertext Block (16 bytes)
Ar’ Diffusion PHT(x,y) = 2x+y mod 256, x+y mod 256) Confusion Bit wise XOR – exponential – Addition mod 256 Addition mod 256 – logarithmic – Bit wise XOR e: (45i mod 257) mod 256 l: I=e(j) -Overview -Blocks used -Weakness -Authentication -E1algorithm -Key handling -E3 -E2 -SAFER+ -Round -Key Schedule -Implementation -Encryption -modes -Key Reduction -Engine (E0) -Timing -PRNG
Bias words Bp[I]=((45(4517p+I+1 mod 257)mod 257)mod 256) -Overview -Blocks used -Weakness -Authentication -E1algorithm -Key handling -E3 -E2 -SAFER+ -Round -Key Schedule -Implementation -Encryption -modes -Key Reduction -Engine (E0) -Timing -PRNG
KEY Scheduler Controller Encryption Round Register -Overview -Blocks used -Weakness -Authentication -E1algorithm -Key handling -E3 -E2 -SAFER+ -Round -Key Schedule -Implementation -Encryption -modes -Key Reduction -Engine (E0) -Timing -PRNG
-Overview -Blocks used -Weakness -Authentication -E1algorithm -Key handling -E3 -E2 -SAFER+ -Round -Key Schedule -Implementation -Encryption -modes -Key Reduction -Engine (E0) -Timing -PRNG
-Overview -Blocks used -Weakness -Authentication -E1algorithm -Key handling -E3 -E2 -SAFER+ -Round -Key Schedule -Implementation -Encryption -modes -Key Reduction -Engine (E0) -Timing -PRNG
-Overview -Blocks used -Weakness -Authentication -E1algorithm -Key handling -E3 -E2 -SAFER+ -Round -Key Schedule -Implementation -Encryption -modes -Key Reduction -Engine (E0) -Timing -PRNG
-Overview -Blocks used -Weakness -Authentication -E1algorithm -Key handling -E3 -E2 -SAFER+ -Round -Key Schedule -Implementation -Encryption -modes -Key Reduction -Engine (E0) -Timing -PRNG
Bluetooth Standard • Hardware LFSR Non Repeating • 23 hr 18 min • 3.2 kHz • 28 bits • Serial • 128 bits • Parallel Randomly Generated Pseudo Random Number Generator • Software -Overview -Blocks used -Weakness -Authentication -E1algorithm -Key handling -E3 -E2 -SAFER+ -Round -Key Schedule -Implementation -Encryption -modes -Key Reduction -Engine (E0) -Timing -PRNG