YoVDO

Breaking the Bluetooth Pairing - Fixed Coordinate Invalid Curve Attack

Offered By: TheIACR via YouTube

Tags

Conference Talks Courses Cybersecurity Courses Cryptography Courses Key Exchange Courses Elliptic Curve Cryptography Courses Key Derivation Courses Bluetooth Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the vulnerabilities in Bluetooth pairing through this conference talk that delves into the Fixed Coordinate Invalid Curve Attack. Learn about elliptic curve cryptography fundamentals, including group elements, point operations, and the Diffie-Hellman key exchange. Understand the intricacies of the Bluetooth pairing procedure, authentication phase, and how the attack exploits design flaws. Discover the attack methodology, including key derivation, verification, and over-air packet manipulation. Examine mitigation strategies and the disclosure process, as well as improvements in early secure connections and secure pairing protocols.

Syllabus

Introduction
Bluetooth
Bluetooth Pairing
First Attack
What is an Eelliptic Curve
Group Elements
Inverse Definition
Point Addition
Point Doubling
Identity Element
Eelliptic Curve DiffieHellman
Invalid Curve Attack
Assumptions
Pairing Procedure
Key Exchange
Authentication Phase
Attack Phase
SemiPassive
Key derivation
Verification
Frequency Hopping
Over Air Pocket Manipulation
Design Flaws
Mitigation
Disclosure
Early Secure Connections
Secure Pairing


Taught by

TheIACR

Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube