Related Concepts
Definition
E0 is a stream cipher, designed especially for Bluetooth communications (Bluetooth is a standard for wireless short-range connectivity, see [1]). It is a synchronous stream cipher.
Background
E0 uses a secret key of at most 128 bits, and an initialization vector IV of 64 bits. IV is composed of a 48-bit Bluetooth address, and a 26-bit master counter. Bluetooth protocol processes frames of at most 2 745 bits, each frame being encrypted with a different IV, while the secret key K remains the same for the whole session.
As usual for stream ciphers, encryption/decryption relies on two important steps: the setup of the initial state and the keystream generation.
The system is derived from the summation generator, with four inputs LFSRsand four memory bits. The four LFSRs have lengths 25, 31, 33, and 39, respectively, their feedback polynomials are all primitive, with...
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Recommended Reading
Bluetooth TM (2001) Bluetooth specifications. Version 1.1, February 2001. http://www.bluetooth.com/
Ekdahl P, Johansson T (2000) Some results on correlations in the Bluetooth stream cipher. Proceedings of the 10th joint conference on communications and coding
Fluhrer S, Lucks S (2001) Analysis of the E0 encryption scheme. Selected areas in cryptography 2001. Springer, Berlin
Golic J, Bagini V, Morgari G (2002) Linear cryptanalysis of bluetooth stream cipher. Advances in cryptology – Eurocrypt’02. Lectures notes in computer science, vol 2332. Springer, pp 238–255
Hermelin M, Nyberg K (1999) Correlation properties of the Bluetooth combiner. Information security and cryptology – ICISC’99. Lecture notes in computer science, vol 1787. Springer, pp 17–29
Lu Y, Vaudenay S (2004) Faster correlation attack on bluetooth keystream generator E0. Advances in cryptology – crypto 2004. Lecture notes in computer science, vol 3152. Springer, pp 407–425
Lu Y, Vaudenay S (2004) Cryptanalysis of bluetooth keystream generator two-level E0. Advances in cryptology – asiacrypt 2004. Lecture notes in computer science, vol 3621. Springer, pp 483–499
Lu Y, Meier W, Vaudenay S (2005) The conditional correlation attack: a practical attack on bluetooth encryption. Advances in cryptology – crypto 2005. Lecture notes in computer science, vol 3621. Springer, pp 97–117
Lu Y (2006) Applied stream ciphers in mobile communications. PhD thesis, Ecole Polytechnique Fédérale de Lausanne
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this entry
Cite this entry
Fontaine, C. (2011). E0. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_346
Download citation
DOI: https://doi.org/10.1007/978-1-4419-5906-5_346
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-5905-8
Online ISBN: 978-1-4419-5906-5
eBook Packages: Computer ScienceReference Module Computer Science and Engineering