Breaking News
Comments
Oldest First | Newest First | Threaded View
Susan Rambo
User Rank
Author
Blame the user?
Susan Rambo   5/21/2014 1:22:51 PM
NO RATINGS
Hi Jessica, what did the Broadcom executive say about why the user is the "security hole"? 

y_sasaki
User Rank
Author
RSA key exhange over Bluetooth
y_sasaki   5/21/2014 6:41:34 PM
NO RATINGS
As long as I've read Bluetooth 4.1 Core Specification, Bluetooth LE pairing (key exchange) is done with pseudo-random and hash. In other words, it is not based on RSA public-key key exchange. There is notion that says future version of Bluetooth will include "elliptic curve cryptography and Diffie-Hellman public key exchanges" (Volume 3, Part H, Section 2.3.1), but still no mention to RSA public key exchange.

 

RSA is well-defined, widely adopted, relatively lightweight (compare to DH or EC), considered to be very secure public key algorithm. Security on internet (SSL/TLS) is almost dominated by RSA (though TLS also supports DH, rarely used in practice). RSA is also popular in WiFi enterprise security, which uses essentially same TLS protocol over EAP framework.

Definately 4Kbit hardware-accelarated RSA engine is something "nice to have". However, as long as I read Bluetooth core spec, RSA is not adopted as standard as I wrote above.

In the end my question is, is RSA-based Bluetooth security is propriately to Broadcomm chipset, or are they (Broadcomm) want it to be part of Bluetooth SIG standard?

Lauree
User Rank
Author
Re: RSA key exhange over Bluetooth
Lauree   5/24/2014 2:30:43 AM
NO RATINGS
Even I have heard about this that Bluetooth LE pairing is not based on RSA public-key key exchange.

I am too waiting for the answer.


Thanks,

Lauree

Ruby on Rails Developer

 



Datasheets.com Parts Search

185 million searchable parts
(please enter a part number or hit search to begin)
Radio
LATEST ARCHIVED BROADCAST

What are the engineering and design challenges in creating successful IoT devices? These devices are usually small, resource-constrained electronics designed to sense, collect, send, and/or interpret data. Some of the devices need to be smart enough to act upon data in real time, 24/7. Specifically the guests will discuss sensors, security, and lessons from IoT deployments.

Brought to you by:

Like Us on Facebook
Special Video Section
Once the base layer of a design has been taped out, making ...
In this short video we show an LED light demo to ...
The LTC2380-24 is a versatile 24-bit SAR ADC that combines ...
In this short video we show an LED light demo to ...
02:46
Wireless Power enables applications where it is difficult ...
07:41
LEDs are being used in current luxury model automotive ...
With design sizes expected to increase by 5X through 2020, ...
01:48
Linear Technology’s LT8330 and LT8331, two Low Quiescent ...
The quality and reliability of Mill-Max's two-piece ...
LED lighting is an important feature in today’s and future ...
05:27
The LT8602 has two high voltage buck regulators with an ...
05:18
Silego Technology’s highly versatile Mixed-signal GreenPAK ...
The quality and reliability of Mill-Max's two-piece ...
01:34
Why the multicopter? It has every thing in it. 58 of ...
Security is important in all parts of the IoT chain, ...
Infineon explains their philosophy and why the multicopter ...
The LTC4282 Hot SwapTM controller allows a board to be ...
This video highlights the Zynq® UltraScale+™ MPSoC, and sho...
Homeowners may soon be able to store the energy generated ...
The LTC®6363 is a low power, low noise, fully differential ...