How Bluetooth Works |
Written by Harry Fairhead | |||
Friday, 19 August 2022 | |||
Page 2 of 2
Secure?If you are going to commit your data to a wireless link security has to be a major concern. As Bluetooth signals can be picked up by anyone within range some sort of cryptography has to be used to make sure that your data remains private. The only advantage that Bluetooth has over other wireless technologies, such as WiFi networking, is that its shorter range means that you should be able to see any potential eavesdroppers! Bluetooth has three security modes:
Mode 3 authentication is the most common and it is quite a complicated procedure. First the user enters a PIN code on both Bluetooth devices. The PIN code is used to generate a 128-bit link key. The device trying to make the connection then has to transmit its address – every Bluetooth device has a unique 48-bit address assigned when it is manufactured – and the device that is trying to authenticate the connection transmits a 32-bit random “challenge”. Both devices then use the link key generated from the PIN, the 32-bit challenge and the address of the device trying to connect to compute an authenticated response. As long the same values are used for all of these numbers both machines compute the same Link Key and the device trying to connect transmits this to the authenticating device which checks that they are indeed identical. If they don’t match the connection is refused and, to stop hackers trying to guess the PIN number, the connection cannot be attempted again for a period of time. Notice that the fact that the device address is used in the authentication makes it difficult for a hacker to substitute another device part way through the authentication process.
(click to enlarge) As far as the user is concerned Bluetooth authentication is just a matter of typing in a shared password in the form of a PIN. The main problem with PIN code authentication is that most manufacturers use a default PIN code of 0000 or similiar and then things become far less secure. If this is too much for the user then devices can be “paired”. This causes both devices to store and reuse the link key to automate connection without the PIN number having to be typed in. Of course you can’t pair devices unless they have first successfully authenticated but after this one true test of identity, paired devices trust one another. Notice that even paired devices use the link key, device address and a challenge to compute an authentication response – the only difference is that the link key generated from the PIN is reused. Of course devices can be unpaired just as easily and then the PIN is required to make the connection. As well as authentication, Bluetooth offers three modes of encryption for data being transmitted between devices.
The encryption algorithm makes use of a key generated using the Authenticated Cipher Offset, which is generated as part of the authentication process along with the authentication response. That is, the authenticated cipher offset is also computed using the link key, device address and 32-bit challenge. The Authenticated Cipher Offset is used again with the link key and challenge to create a key ranging in size from 8 to 128 bits. This key is then used to encrypt the data in each packet being transmitted. There are some refinements to the encryption process that make it difficult to attack by a range of well-known techniques. WeaknessesBluetooth security is fairly good and well thought out. It does have some weaknesses that you need to be aware of. The first is that the PIN code is usually short and this makes them easier to guess than long passwords. You can use longer PIN codes but most users don’t. Distributing PIN codes in a secure fashion so that devices in an office can connect to each other can be a problem. There is also a problem with the way that the 32-bit challenges are generated, which can result in a pattern for some PIN numbers. Finally authentication operates only at the device level and not the user level. A paired device will connect even if it has been stolen. All of these problems pale into insignificance compared to the real weakness of Bluetooth security – most users don’t enable it and don’t even know that they can! As a result most Bluetooth devices are operating in mode 1 for both authentication and encryption. More information:The official Bluetooth site: http://www.bluetooth.com/ To be informed about new articles on I Programmer, sign up for our weekly newsletter, subscribe to the RSS feed and follow us on Twitter, Facebook or Linkedin.
Comments
or email your comment to: comments@i-programmer.info |
|||
Last Updated ( Friday, 19 August 2022 ) |