Breaking the Bluetooth Pairing - Fixed Coordinate Invalid Curve Attack

Breaking the Bluetooth Pairing - Fixed Coordinate Invalid Curve Attack

TheIACR via YouTube Direct link

Authentication Phase

16 of 27

16 of 27

Authentication Phase

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Breaking the Bluetooth Pairing - Fixed Coordinate Invalid Curve Attack

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Bluetooth
  3. 3 Bluetooth Pairing
  4. 4 First Attack
  5. 5 What is an Eelliptic Curve
  6. 6 Group Elements
  7. 7 Inverse Definition
  8. 8 Point Addition
  9. 9 Point Doubling
  10. 10 Identity Element
  11. 11 Eelliptic Curve DiffieHellman
  12. 12 Invalid Curve Attack
  13. 13 Assumptions
  14. 14 Pairing Procedure
  15. 15 Key Exchange
  16. 16 Authentication Phase
  17. 17 Attack Phase
  18. 18 SemiPassive
  19. 19 Key derivation
  20. 20 Verification
  21. 21 Frequency Hopping
  22. 22 Over Air Pocket Manipulation
  23. 23 Design Flaws
  24. 24 Mitigation
  25. 25 Disclosure
  26. 26 Early Secure Connections
  27. 27 Secure Pairing

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.