Enhanced SAFER+ Algorithm for Bluetooth to Withstand Against Key Pairing Attack

Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 176)

Abstract

The SAFER+-128 algorithm is the basis of all block ciphers used in Bluetooth security environment. Though the SAFER+ with key size 128 bits has yet not any practical attack on it, the pairing mechanism of bluetooth which uses this algorithm founds to be vulnerable to the brute force attack upon it. In the enhanced SAFER+ algorithm the shuffling parameter of SAFER+ has been customized in order to provide it strength against the key pairing attack. The results of the experiments and other statistical details obtained for this change are shown at the end of this paper.

Keywords

Pairing Unitary Matrix Primitive Roots 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Gehrmann, C., Persson, J., Smeets, B.: Bluetooth Security. Artech House, London (2004)Google Scholar
  2. 2.
    Yaniv, S., Avishai, W.: Cracking the Bluetooth PIN. In: 3rd International Conference on Mobile Systems, Applications, and Services, pp. 39–50. ACM, New York (2005)Google Scholar
  3. 3.
    Sharmila, D., Neelaveni, R.: A Proposed SAFER Plus Security algorithm using Fast Walsh Hadamard transform for Bluetooth Technology. International Journal of Wireless & Mobile Networks (IJWMN) 1(2) (2009)Google Scholar
  4. 4.
    Sharmila, D., Neelaveni, R.: A Proposed SAFER Plus Security algorithm using Fast Psuedo Hadamard Transform (FPHT) with Maximum Distance Separable code for Bluetooth Technology. International Journal of Wireless & Mobile Networks (IJWMN) 1(2) (2009)Google Scholar
  5. 5.
    Eric, G.: A man-in-the-middle attack using Bluetooth in a WLAN interworking environnment. In: 3GPP TSG SA WG3 Security 32, UK (2004)Google Scholar
  6. 6.
    Jonathan, K., Rafail, O., Moti, Y.: Efficient Password-Authenticated Key Exchange using Human-Memorable Passwords. Springer (2001)Google Scholar
  7. 7.
    Markus, J., Susanne, W.: Security Weaknesses in Bluetooth. Springer (2001)Google Scholar
  8. 8.
    Kelsey, J., Schneier, B., Wagner, D.: Key Schedule Weaknesses in SAFER+. In: Second AES Candidate Conference (1999)Google Scholar
  9. 9.
    James, M.: On the Optimality of SAFER+ Diffusion. In: Second AES Candidate Conference. National Institute of Standards and Technology, pp. 22–23 (1999)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  1. 1.Computer Engg. DepartmentLDRP – ITRGandhinagarIndia
  2. 2.I.T. DepartmentLD College of Engg.AhmedabadIndia

Personalised recommendations