T Cryptography and Data Security. Lecture 11 Bluetooth Security. Outline

Similar documents
ON SECURITY OF BLUETOOTH WIRELESS SYSTEM. Pavel Kucera, Petr Fiedler, Zdenek Bradac, Ondrej Hyncica

CS4/MSc Computer Networking. Lecture 13: Personal Area Networks Bluetooth

Introduction to Bluetooth Wireless Technology

Securing A Bluetooth Device

Wireless Security Security problems in Wireless Networks

Transport Level Security

12/2/09. Mobile and Ubiquitous Computing. Bluetooth Networking" George Roussos! Bluetooth Overview"

Upgrade of Bluetooth Encryption and Key Replay Attack

PA RT 3 CROSS LAYER FUNCTIONS

SSL/TLS. How to send your credit card number securely over the internet

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

Computer Networks II Advanced Features (T )

Introduction and Overview. Why CSCI 454/554?

L13. Reviews. Rocky K. C. Chang, April 10, 2015

Endpoint Security - what-if analysis 1

The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Security Architecture. Lecture 13: Prof. Shervin Shirmohammadi CEG

Security of Wireless Networks in Intelligent Vehicle Systems

What is Eavedropping?

Information Security CS 526

19.1. Security must consider external environment of the system, and protect it from:

By FaaDoOEngineers.com

WAP Security. Helsinki University of Technology S Security of Communication Protocols

A Survey on Security Threats and Vulnerability attacks on Bluetooth Communication

Cryptography CS 555. Topic 16: Key Management and The Need for Public Key Cryptography. CS555 Spring 2012/Topic 16 1

Security Overview of Bluetooth

Computer Security. 10r. Recitation assignment & concept review. Paul Krzyzanowski. Rutgers University. Spring 2018

Data Security and Privacy. Topic 14: Authentication and Key Establishment

Authentication in real world: Kerberos, SSH and SSL. Zheng Ma Apr 19, 2005

Connecting & Addressing Security Concerns of Bluetooth Technology in Current Scenario

The Security Problem

Security issues: Encryption algorithms. Threats Methods of attack. Secret-key Public-key Hybrid protocols. CS550: Distributed OS.

ACOS 3 Contact Card. Functional Specification. Subject to change without prior notice

Virtual Private Networks.

Overview. SSL Cryptography Overview CHAPTER 1

Chapter 19 Security. Chapter 19 Security

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)

Cristina Nita-Rotaru. CS355: Cryptography. Lecture 17: X509. PGP. Authentication protocols. Key establishment.

8. Network Layer Contents

Amarjeet Singh. February 7, 2012

e-commerce Study Guide Test 2. Security Chapter 10

Ethical Hacking and. Version 6. Module XXXVII Bluetooth Hacking

Adversary Models. CPEN 442 Introduction to Computer Security. Konstantin Beznosov

Bluetooth: Short-range Wireless Communication

Lecture Nov. 21 st 2006 Dan Wendlandt ISP D ISP B ISP C ISP A. Bob. Alice. Denial-of-Service. Password Cracking. Traffic.

Drone /12/2018. Threat Model. Description. Threats. Threat Source Risk Status Date Created

Bluetooth. Bluetooth Radio

Security Management for Mobile Peer-to-Peer Systems

Link & end-to-end protocols SSL/TLS WPA 2/25/07. Outline. Network Security. Networks. Link and End-to-End Protocols. Link vs. End-to-end protection

GPRS security. Helsinki University of Technology S Security of Communication Protocols

Pass Microsoft Exam

Chapter 15: Security. Operating System Concepts 8 th Edition,

BEST PRACTICES FOR PERSONAL Security

Security in IEEE Networks

Language-Based Protection

CSCE 715: Network Systems Security

The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.).

SINGLE COURSE. NH9000 Certified Ethical Hacker 104 Total Hours. COURSE TITLE: Certified Ethical Hacker

CIS 21 Final Study Guide. Final covers ch. 1-20, except for 17. Need to know:

Overview of IEEE b Security

Paul A. Karger

Lecture III : Communication Security Mechanisms

Communication and Distributed Systems Seminar on : LTE Security. By Anukriti Shrimal May 09, 2016

ENRNG3076 : Oral presentation BEng Computer and Communications Engineering

Authenticating on a Ham Internet

Applications of Cryptography in Wireless Communication

e-pg Pathshala Quadrant 1 e-text

Secure Ethernet Communication for Autonomous Driving. Jared Combs June 2016

CSCE 715: Network Systems Security

Transport Layer Security

Frequently Asked Questions (FAQ)

Security: Cryptography

Introduction to information Security

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005

Chapter 2. Switch Concepts and Configuration. Part II

Product Specification

The security of existing wireless networks

Lecture Note 6 KEY MANAGEMENT. Sourav Mukhopadhyay

MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations

ISACA CISA. ISACA CISA ( Certified Information Systems Auditor ) Download Full Version :

Web insecurity Security strategies General security Listing of server-side risks Language specific security. Web Security.

Computer Networking. What is network security? Chapter 7: Network security. Symmetric key cryptography. The language of cryptography

Auth. Key Exchange. Dan Boneh

ETHICAL HACKING & COMPUTER FORENSIC SECURITY

Protection and Security. Sarah Diesburg Operating Systems CS 3430

Once all of the features of Intel Active Management Technology (Intel

IPSec. Slides by Vitaly Shmatikov UT Austin. slide 1

[A SHORT REPORT ON BLUETOOTH TECHNOLOGY]

TELEPHONY CONTROL PROTOCOL SPECIFICATION

SUPERSTACK 3 FIREWALL FIRMWARE VERSION RELEASE NOTES

Distributed Systems. Lecture 14: Security. Distributed Systems 1

CS 428/528 Computer Networks Lecture 01. Yan Wang

Mobile MOUSe HACKING REVEALED ONLINE COURSE OUTLINE

Distributed Systems. Lecture 14: Security. 5 March,

Network Security: Broadcast and Multicast. Tuomas Aura T Network security Aalto University, Nov-Dec 2010

Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls

Interworking Evaluation of current security mechanisms and lacks in wireless and Bluetooth networks ...

EXCERPT. NIST Special Publication R1. Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations

SANS SEC504. Hacker Tools, Techniques, Exploits and Incident Handling.

Protocols, Technologies and Standards Secure network protocols for the OSI stack P2.1 WLAN Security WPA, WPA2, IEEE i, IEEE 802.1X P2.

Transcription:

T-79.4501 Cryptography and Data Security Lecture 11 Bluetooth Security Outline Security threats Objectives of Bluetooth security The Bluetooth Baseband security Pairing procedure Authentication/Encryption key generation Algorithms Summary 1

Threats in communication networks Application Presentation Service and application theft; Database & document read, modify, insertion; wildlife(viruses, worms, Trojan Horses, etc.); Administrator services (Accts., privilege enhancement, etc.) Message-level encryption attack, copying of user display contents Session Password theft Transport Network Transit attacks (vs. 3rd party networks); Back/trap doors; Port scanning; Buffer overflows; NAKs Address spoofing, routing table corruption MAC Physical DoS, Bulk encryption, EDAC, RX, Location attacks, key theft Radio intercept, Eavesdropping, Jamming, Traffic Analysis, Physical damage Protection in bluetooth Application Service and application theft; Database & document read, modify, insertion; wildlife(viruses, worms, Trojan Horses, etc.); Administrator services (Accts., privilege enhancement, etc.) LAN Access LAN Access applications Existing or modified Presentation Message-level encryption attack, copying of user display contents PPP PPP protocol stack Existing PPP COM port Session Password theft SDP RFCOMM L2CAP Transport Transit attacks (vs. 3rd party networks); Back/trap doors; Port scanning; Buffer overflows; NAKs Link Mgr Bluetooth Authentication Network Address spoofing, routing table corruption Baseband RF Bluetooth Data Encryption MAC DoS, Bulk encryption, EDAC, RX, Location attacks, key theft Physical Radio intercept, Eavesdropping, Jamming, Traffic Analysis, Physical damage 2

End-to-end security vs. link Level security Bluetooth provides link level security Many applications require end-to-end security dial-up networking for corporate clients (IPSEC) e-mail (PGP,S/MIME) Browser transactions (TLS) Bluetooth SIG encourage reuse of existing network, transport, session and application layer security mechanisms Bluetooth Security Overview Basic objectives Provide means for a secure link layer: Entity authentication Authenticated connections between personal devices Hardware identification 128 bits key Link privacy Allow private exchange of data between devices Examples: File transfer, phone book/calendar/task synchronisation 8-128 bits key 3

Bluetooth Security Overview What it does not do... Message authentication Originating application is not identified Secure end-to-end links Plain text in, plain text out... Bluetooth Security Overview Basic concept Key types Link keys (128 bit) Encryption keys (8-128 bit) Pairing Establishing secret keys Encryption algorithm Stream cipher 4

Key Types (I) Link keys Encryption key Temporary Semi-permanent Master Key Unit Key Combination Key Initialisation Key Initialisation key Key Types (II) Derived from supplied number Relatively short PIN direct user interaction Super PIN key agreement protocol at application layer Used once, then discarded Combination key Combination of two contributions Unique for each pair of units 5

Unit key Key Types (III) Generated in one unit Restricted memory resources Encryption key Derived from current link key Renewed every session Configurable key length (8-128 bit) Maximal length HW restricted Pairing Procedure First time connection Generate initialisation key Generate link key Generate encryption key Exchange link key Authenticate 6

Pairing Procedure Non-first time connections Get current link key Authenticate Generate encryption key Pairing Procedure Generate Initialization Key Unit A Unit B ADDR_A RND PIN ADDR_A ADDR_A RND PIN E 22 RND E 22 7

Unit A Pairing Procedure Unit key Unit B ADDR_A RND_A E 21 + + K A K A Pairing Procedure Combination key Unit A Unit B ADDR_A RND_A E 21 + + RND_A + RND_B ADDR_B E 21 ADDR_B RND_B + + RND_B + RND_A ADDR_A E 21 E 21 K AB LK_K B LK_K A LK_K A LK_K B + + K BA 8

Key Usage Semi-permanent or temporary link keys? D K AD A K MD K MA M K MC K MB B C Point-to-point configuration Key Usage Semi-permanent or temporary link keys? D K AD A K master K master M K master K master B C Point-to-multipoint configuration 9

Encryption Key Generation (I) Authentication+K C Authentication AU_RND SRES =? SRES Claimant ADDR E 1 SUCCESS/FAIL ACO Link keys Master key? ADDR ADDR ACO COF EN_RND E 3 K C Encryption Key Generation (II) Kc is 128 bits Governmental attitudes/export issues Different key lengths needed Negotiation necessary (1-16 bytes) Generates Kc in HW of correct length Part of E 0 algorithm Initiate the LFSRs of the encryption machine 10

The Algorithms E 0 Encryption algorithm Blend K C K C LFSR 1 CLK EN_RND Form input data LFSR 2 LFSR 3 Summation Combiner Enc. stream ADDR LFSR 4 Stream cipher The Algorithms E 0 Encryption algorithm Fast and easy HW implementation Improved correlation properties Blend register feedback Initially clocked 240 times Frequent re-synchronising LFSR starting state updated for each slot Point-to-point or point-to-multipoint 11

The Algorithms E 1 Authentication algorithm Computationally secure authentication code Based on SAFER+ Runs for 17 rounds Modified to be non-invertible The Algorithms E 21, E 22 Link key generation E 21 : Input: RAND, BD_ADDR (48 bit) Output: Key (128 bit) Unit and combination keys E 22 : Input: RAND, PIN, Length(PIN) Output: Key (128 bit) Initialisation and master keys 12

Key usage summary PIN First time connections PIN E 22 E 22 LINK KEY Authentication LINK KEY E 3 EN_RAND E 3 ENCRYPTION KEY Encryption ENCRYPTION KEY E0 Algorithm summary HW implementation Subject to export regulations E1, E21, E22, E3 Based on the same block cipher Suitable for SW implementation 13

Summary There exists many security threats in communication networks The Bluetooth specification provides authentication protection and link level encryption The Bluetooth specification meets security industry level for protection 14