Unlock instant, AI-driven research and patent intelligence for your innovation.

Side-channel analysis method for ble key agreement protocol

A technology of side channel analysis and key negotiation, which is applied in the field of side channel analysis for the Bluetooth low energy protocol, which can solve the limited pairing process of the attack target, the poor practicability of the attack method, and the inability to attack the "secure connection pairing" process. and other problems to achieve the effect of reducing the attack curve

Active Publication Date: 2021-08-06
SHANGHAI JIAO TONG UNIV
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The characteristics and defects of the existing attack schemes for the BLE protocol are: 1) only applicable to the traditional pairing process before Bluetooth 4.2, and cannot attack the "secure connection pairing" process used after Bluetooth 4.2; 2) the target of the attack is limited to The pairing process, and the pairing process will only happen once in a long period of time, the practicality of the attack method is not strong

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Side-channel analysis method for ble key agreement protocol
  • Side-channel analysis method for ble key agreement protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] This embodiment relates to a side channel analysis system for the BLE key agreement protocol, including: a sniffing analysis module, an electromagnetic information collection module and a key recovery module, wherein: the sniffing analysis module captures communication data between BLE devices package, and then analyze the key key negotiation parameters according to the standard data format and output them to the key recovery module; the electromagnetic information acquisition module reads the electromagnetic leakage information of the SK calculation process and outputs it to the key recovery module; the key recovery module combines the AES algorithm input and electromagnetic leak information recovery LTK.

[0024] The sniffing analysis module includes: a sniffing device and an analysis unit, wherein: the sniffing device transmits the captured bluetooth communication packet to the analysis unit, and the analysis unit controls the start and stop of the sniffing device and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A side channel analysis method for the BLE session key negotiation protocol, by collecting the electromagnetic radiation information when the BLE device runs the calculation session key algorithm (AES‑128), combined with the key negotiation key parameters captured by the sniffing technology, The key LTK is recovered using Dependent Power Analysis (CPA). The invention uses sniffing technology and CPA as the basic attack tool, and constructs a comprehensive attack method according to the structure of the BLE encrypted communication protocol. Through this method, the LTK shared by the paired Bluetooth devices is recovered, and then the session key (SK) is recovered and the BLE decrypted. All communication packets between devices.

Description

technical field [0001] The present invention relates to a technology in the field of computer security, in particular to a side channel analysis method for the Bluetooth Low Energy (BLE) protocol, applicable to differential power analysis (DPA), correlation power consumption Analysis (CPA) and Template Attack (TA). Background technique [0002] Bluetooth Low Energy is a typical wireless communication technology that uses the 2.4GHz radio frequency to allow mobile devices to exchange data over short distances. BLE devices implement authentication through pairing. After pairing, devices share a long-term key (LTK), which can ensure the security of transmitted data through LTK and encryption technology. Before encryption, the session between devices is transmitted in plain text, and sniffing technology (sniffing) can be used to track and capture the communication content between BLE devices. [0003] The characteristics and defects of the existing attack schemes for the BLE p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06H04L9/08H04W4/80
CPCH04L9/0631H04L9/0838H04L9/0869H04W4/80
Inventor 曹培谷大武陆海宁张驰原义栋
Owner SHANGHAI JIAO TONG UNIV