YoVDO

Breaking the Bluetooth Pairing - Fixed Coordinate Invalid Curve Attack

Offered By: TheIACR via YouTube

Tags

Conference Talks Courses Cybersecurity Courses Cryptography Courses Key Exchange Courses Elliptic Curve Cryptography Courses Key Derivation Courses Bluetooth Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the vulnerabilities in Bluetooth pairing through this conference talk that delves into the Fixed Coordinate Invalid Curve Attack. Learn about elliptic curve cryptography fundamentals, including group elements, point operations, and the Diffie-Hellman key exchange. Understand the intricacies of the Bluetooth pairing procedure, authentication phase, and how the attack exploits design flaws. Discover the attack methodology, including key derivation, verification, and over-air packet manipulation. Examine mitigation strategies and the disclosure process, as well as improvements in early secure connections and secure pairing protocols.

Syllabus

Introduction
Bluetooth
Bluetooth Pairing
First Attack
What is an Eelliptic Curve
Group Elements
Inverse Definition
Point Addition
Point Doubling
Identity Element
Eelliptic Curve DiffieHellman
Invalid Curve Attack
Assumptions
Pairing Procedure
Key Exchange
Authentication Phase
Attack Phase
SemiPassive
Key derivation
Verification
Frequency Hopping
Over Air Pocket Manipulation
Design Flaws
Mitigation
Disclosure
Early Secure Connections
Secure Pairing


Taught by

TheIACR

Related Courses

Master Mathematical Cryptography 2020: Crack Any Code
Udemy
SSL, TLS and HTTPS Overview
Bogdan Stashchuk via YouTube
Overview of Elliptic Curve Isogenies Based Public Key Cryptography Assumptions
Simons Institute via YouTube
Crypto 101 - An Intro to Real World Crypto
YouTube
Elliptic Curve Cryptography for Those Who Are Afraid of Math
Security BSides San Francisco via YouTube