Key negotiation downgrade attacks on bluetooth and bluetooth low energy

Bluetooth (BR/EDR) and Bluetooth Low Energy (BLE) are pervasive wireless technologies specified in the Bluetooth standard. The standard includes key negotiation protocols used to generate long-term keys (during pairing) and session keys (during secure connection establishment). In this work, we demo...

Full description

Bibliographic Details
Main Authors: Antonioli, D, Tippenhauer, NO, Rasmussen, K
Format: Journal article
Language:English
Published: Association for Computing Machinery 2020
_version_ 1826267529018867712
author Antonioli, D
Tippenhauer, NO
Rasmussen, K
author_facet Antonioli, D
Tippenhauer, NO
Rasmussen, K
author_sort Antonioli, D
collection OXFORD
description Bluetooth (BR/EDR) and Bluetooth Low Energy (BLE) are pervasive wireless technologies specified in the Bluetooth standard. The standard includes key negotiation protocols used to generate long-term keys (during pairing) and session keys (during secure connection establishment). In this work, we demonstrate that the key negotiation protocols of Bluetooth and BLE are vulnerable to standard-compliant entropy downgrade attacks. In particular, we show how an attacker can downgrade the entropy of any Bluetooth session key to 1 byte, and of any BLE long-term key and session key to 7 bytes. Such low entropy values enable the attacker to brute-force Bluetooth long-term keys and BLE long-term and session keys, and to break all the security guarantees promised by Bluetooth and BLE. As a result of our attacks, an attacker can decrypt all the ciphertext and inject valid ciphertext in any Bluetooth and BLE network. Our key negotiation downgrade attacks are conducted remotely, do not require access to the victims’ devices, and are stealthy to the victims. As the attacks are standard-compliant, they are effective regardless of the usage of the strongest Bluetooth and BLE security modes (including Secure Connections), the Bluetooth version, and the implementation details of the devices used by the victims. We successfully attack 38 Bluetooth devices (32 unique Bluetooth chips) and 19 BLE devices from different vendors, using all the major versions of the Bluetooth standard. Finally, we present effective legacy compliant and non-legacy compliant countermeasures to mitigate our key negotiation downgrade attacks.
first_indexed 2024-03-06T20:55:35Z
format Journal article
id oxford-uuid:3921530f-031c-46f9-8b21-1eacb1dc1615
institution University of Oxford
language English
last_indexed 2024-03-06T20:55:35Z
publishDate 2020
publisher Association for Computing Machinery
record_format dspace
spelling oxford-uuid:3921530f-031c-46f9-8b21-1eacb1dc16152022-03-26T13:53:48ZKey negotiation downgrade attacks on bluetooth and bluetooth low energyJournal articlehttp://purl.org/coar/resource_type/c_dcae04bcuuid:3921530f-031c-46f9-8b21-1eacb1dc1615EnglishSymplectic ElementsAssociation for Computing Machinery2020Antonioli, DTippenhauer, NORasmussen, KBluetooth (BR/EDR) and Bluetooth Low Energy (BLE) are pervasive wireless technologies specified in the Bluetooth standard. The standard includes key negotiation protocols used to generate long-term keys (during pairing) and session keys (during secure connection establishment). In this work, we demonstrate that the key negotiation protocols of Bluetooth and BLE are vulnerable to standard-compliant entropy downgrade attacks. In particular, we show how an attacker can downgrade the entropy of any Bluetooth session key to 1 byte, and of any BLE long-term key and session key to 7 bytes. Such low entropy values enable the attacker to brute-force Bluetooth long-term keys and BLE long-term and session keys, and to break all the security guarantees promised by Bluetooth and BLE. As a result of our attacks, an attacker can decrypt all the ciphertext and inject valid ciphertext in any Bluetooth and BLE network. Our key negotiation downgrade attacks are conducted remotely, do not require access to the victims’ devices, and are stealthy to the victims. As the attacks are standard-compliant, they are effective regardless of the usage of the strongest Bluetooth and BLE security modes (including Secure Connections), the Bluetooth version, and the implementation details of the devices used by the victims. We successfully attack 38 Bluetooth devices (32 unique Bluetooth chips) and 19 BLE devices from different vendors, using all the major versions of the Bluetooth standard. Finally, we present effective legacy compliant and non-legacy compliant countermeasures to mitigate our key negotiation downgrade attacks.
spellingShingle Antonioli, D
Tippenhauer, NO
Rasmussen, K
Key negotiation downgrade attacks on bluetooth and bluetooth low energy
title Key negotiation downgrade attacks on bluetooth and bluetooth low energy
title_full Key negotiation downgrade attacks on bluetooth and bluetooth low energy
title_fullStr Key negotiation downgrade attacks on bluetooth and bluetooth low energy
title_full_unstemmed Key negotiation downgrade attacks on bluetooth and bluetooth low energy
title_short Key negotiation downgrade attacks on bluetooth and bluetooth low energy
title_sort key negotiation downgrade attacks on bluetooth and bluetooth low energy
work_keys_str_mv AT antoniolid keynegotiationdowngradeattacksonbluetoothandbluetoothlowenergy
AT tippenhauerno keynegotiationdowngradeattacksonbluetoothandbluetoothlowenergy
AT rasmussenk keynegotiationdowngradeattacksonbluetoothandbluetoothlowenergy