Breaking the Bluetooth Pairing - Fixed Coordinate Invalid Curve Attack
Offered By: TheIACR via YouTube
Course Description
Overview
Explore the vulnerabilities in Bluetooth pairing through this conference talk that delves into the Fixed Coordinate Invalid Curve Attack. Learn about elliptic curve cryptography fundamentals, including group elements, point operations, and the Diffie-Hellman key exchange. Understand the intricacies of the Bluetooth pairing procedure, authentication phase, and how the attack exploits design flaws. Discover the attack methodology, including key derivation, verification, and over-air packet manipulation. Examine mitigation strategies and the disclosure process, as well as improvements in early secure connections and secure pairing protocols.
Syllabus
Introduction
Bluetooth
Bluetooth Pairing
First Attack
What is an Eelliptic Curve
Group Elements
Inverse Definition
Point Addition
Point Doubling
Identity Element
Eelliptic Curve DiffieHellman
Invalid Curve Attack
Assumptions
Pairing Procedure
Key Exchange
Authentication Phase
Attack Phase
SemiPassive
Key derivation
Verification
Frequency Hopping
Over Air Pocket Manipulation
Design Flaws
Mitigation
Disclosure
Early Secure Connections
Secure Pairing
Taught by
TheIACR
Related Courses
Stealthily Access Your Android Phones - Bypass the Bluetooth AuthenticationBlack Hat via YouTube For the Love of Money - Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems
44CON Information Security Conference via YouTube IoT and the Security of That Mobile App - Mark Loveless
LASCON via YouTube Fuzzing the Phone in the iPhone
media.ccc.de via YouTube BrokenMesh - New Attack Surfaces of Bluetooth Mesh
Black Hat via YouTube