Abstract
The Bluetooth pairing protocol is the one that takes place when two Bluetooth devices get together and want to authenticate to each other. I shall start by giving a high level summary of our work.
Firstly, “Look Ma, we can crack Bluetooth!”, we demonstrate a crack by a passive adversary. On its own this doesn’t look very interesting academically because, from the protocol itself, it is clear that this could be done. So next we ask if this problem can be fixed. The answer is affirmative, and we show how, but this looks like cheating because we fixed it in a way that the original designers of the protocol thought was not allowed. However we then argue that this was a sensible thing to do, and that maybe it is appropriate to relax the constraints that they set on themselves in the first place.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Stajano, F. (2007). Repairing the Bluetooth Pairing Protocol. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 2005. Lecture Notes in Computer Science, vol 4631. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77156-2_5
Download citation
DOI: https://doi.org/10.1007/978-3-540-77156-2_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-77155-5
Online ISBN: 978-3-540-77156-2
eBook Packages: Computer ScienceComputer Science (R0)