
Bluetooth SIG oversees development of the specification and prediction of program that protects Bluetooth pin
Author(s) -
Jyoti Dadwal,
Bhubneshwar Sharma
Publication year - 2016
Publication title -
international journal of advances in scientific research
Language(s) - English
Resource type - Journals
ISSN - 2395-3616
DOI - 10.7439/ijasr.v2i2.2753
Subject(s) - bluetooth , key (lock) , initialization , encryption , computer science , block cipher , stream cipher , interface (matter) , cryptography , computer network , block (permutation group theory) , embedded system , computer security , wireless , operating system , programming language , bubble , maximum bubble pressure method , geometry , mathematics
Bluetooth implementsconfidentiality,authenticationandkeyderivation with custom algorithms based on theSAFER+block cipher. Bluetooth key generation is generally based on a Bluetooth PIN, which must be entered into both devices. This procedure might be modified if one of the devices has a fixed PIN (e.g., for headsets or similar devices with a restricted user interface). During pairing, an initialization key or master key is generated, using the E22 algorithm.TheE0 stream cipher is used for encrypting packets, granting confidentiality, and is based on a shared cryptographic secret, namely a previously generated link key or master key. Those keys, used for subsequent encryption of data sent via the air interface, rely on the Bluetooth PIN, which has been entered into one or both devices.