Skip to main content

Enhanced SAFER+ Algorithm for Bluetooth to Withstand Against Key Pairing Attack

  • Conference paper
Advances in Computing and Information Technology

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 176))

  • 2029 Accesses

Abstract

The SAFER+-128 algorithm is the basis of all block ciphers used in Bluetooth security environment. Though the SAFER+ with key size 128 bits has yet not any practical attack on it, the pairing mechanism of bluetooth which uses this algorithm founds to be vulnerable to the brute force attack upon it. In the enhanced SAFER+ algorithm the shuffling parameter of SAFER+ has been customized in order to provide it strength against the key pairing attack. The results of the experiments and other statistical details obtained for this change are shown at the end of this paper.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Gehrmann, C., Persson, J., Smeets, B.: Bluetooth Security. Artech House, London (2004)

    Google Scholar 

  2. Yaniv, S., Avishai, W.: Cracking the Bluetooth PIN. In: 3rd International Conference on Mobile Systems, Applications, and Services, pp. 39–50. ACM, New York (2005)

    Google Scholar 

  3. Sharmila, D., Neelaveni, R.: A Proposed SAFER Plus Security algorithm using Fast Walsh Hadamard transform for Bluetooth Technology. International Journal of Wireless & Mobile Networks (IJWMN) 1(2) (2009)

    Google Scholar 

  4. Sharmila, D., Neelaveni, R.: A Proposed SAFER Plus Security algorithm using Fast Psuedo Hadamard Transform (FPHT) with Maximum Distance Separable code for Bluetooth Technology. International Journal of Wireless & Mobile Networks (IJWMN) 1(2) (2009)

    Google Scholar 

  5. Eric, G.: A man-in-the-middle attack using Bluetooth in a WLAN interworking environnment. In: 3GPP TSG SA WG3 Security 32, UK (2004)

    Google Scholar 

  6. Jonathan, K., Rafail, O., Moti, Y.: Efficient Password-Authenticated Key Exchange using Human-Memorable Passwords. Springer (2001)

    Google Scholar 

  7. Markus, J., Susanne, W.: Security Weaknesses in Bluetooth. Springer (2001)

    Google Scholar 

  8. Kelsey, J., Schneier, B., Wagner, D.: Key Schedule Weaknesses in SAFER+. In: Second AES Candidate Conference (1999)

    Google Scholar 

  9. James, M.: On the Optimality of SAFER+ Diffusion. In: Second AES Candidate Conference. National Institute of Standards and Technology, pp. 22–23 (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Payal Chaudhari .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chaudhari, P., Diwanji, H. (2012). Enhanced SAFER+ Algorithm for Bluetooth to Withstand Against Key Pairing Attack. In: Meghanathan, N., Nagamalai, D., Chaki, N. (eds) Advances in Computing and Information Technology. Advances in Intelligent Systems and Computing, vol 176. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31513-8_66

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-31513-8_66

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31512-1

  • Online ISBN: 978-3-642-31513-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics