Bluetooth is a widely deployed standard for wireless communications between mobile devices. It uses authenticated Elliptic Curve Diffie-Hellman for its key exchange. In this paper we show that the authentication provided by the Bluetooth pairing protocols is insufficient and does not provide the promised MitM protection. We present a new attack that modifies the y-coordinates of the public keys (while preserving the x-coordinates). The attack compromises the encryption keys of all of the current Bluetooth authenticated pairing protocols, provided both paired devices are vulnerable. Specifically, it successfully compromises the encryption keys of 50% of the Bluetooth pairing attempts, while in the other 50% the pairing of the victims is terminated. The affected vendors have been informed and patched their products accordingly, and the Bluetooth specification had been modified to address the new attack. We named our new attack the “Fixed Coordinate Invalid Curve Attack”. Unlike the well known “Invalid Curve Attack” of Biehl et al. [2] which recovers the private key by sending multiple specially crafted points to the victim, our attack is a MitM attack which modifies the public keys in a way that lets the attacker deduce the shared secret.
[1]
N. Koblitz.
Elliptic curve cryptosystems
,
1987
.
[2]
Radha Poovendran,et al.
The AES-CMAC Algorithm
,
2006,
RFC.
[3]
Tibor Jager,et al.
Practical Invalid Curve Attacks on TLS-ECDH
,
2015,
ESORICS.
[4]
Whitfield Diffie,et al.
New Directions in Cryptography
,
1976,
IEEE Trans. Inf. Theory.
[5]
Bernd Meyer,et al.
Differential Fault Attacks on Elliptic Curve Cryptosystems
,
2000,
CRYPTO.
[6]
Victor S. Miller,et al.
Use of Elliptic Curves in Cryptography
,
1985,
CRYPTO.
[7]
Alfred Menezes,et al.
Validation of Elliptic Curve Public Keys
,
2003,
Public Key Cryptography.
[8]
Mike Ryan,et al.
Bluetooth: With Low Energy Comes Low Security
,
2013,
WOOT.