Results 1 to 4 of 4

Thread: Encryption type for Bluetooth security

  1. #1
    Join Date
    Feb 2009
    Posts
    32

    Encryption type for Bluetooth security

    hey friends,

    just for the information I wanted to know the technology applied behind the Bluetooth application enabling high level security in an open network....
    What type of encryption is used in Bluetooth security ?

    thanks

  2. #2
    Join Date
    Jan 2006
    Posts
    3,792

    Re: Encryption type for Bluetooth security

    Bluetooth security is a concern that many people have. It is a common misconception that all Bluetooth devices can connect to any other device and browse the information on it. This cannot be done without the user setting the device to do so. Bluetooth security has various levels of authentication including pin code entry and up to 128-bit encryption.

    Bluetooth Pass Key -

    • This is a unique, case-sensitive password that is required in order to access and communicate with another Bluetooth device.
    • The Pass Key is continually incorporated into the 128-bit Encryption; also it reinforces pairing by only allowing devices to pair if the password matches.

  3. #3
    Join Date
    Jan 2006
    Posts
    3,792

    Re: Encryption type for Bluetooth security

    Some more features -

    Bluetooth Pairing - This convenient Bluetooth security feature remembers the Pass Key used to allow communication with another Bluetooth device. For two devices to be paired, the same Pass Key must be entered on both devices. Pairing lets Bluetooth devices remain permanently linked to each other, until you un-pair them. Even if a “paired” Bluetooth device is turned off, or just out of range, it will be visible to the Bluetooth devices it has been paired with when it is powered on again or comes within wireless-signal range.

    Bluetooth Encryption - Bluetooth features 128-bit security encryption to make sure that no other devices can receive transmissions that you send.

    Stealth Mode - Some Bluetooth devices have the ability to turn off the ‘Discoverable’ setting. When a Bluetooth device is Discoverable, it broadcasts its existence to other Bluetooth devices and announces that it is available for Bluetooth communications. When you turn off discoverability, your device will not appear to other Bluetooth devices searching the airwaves for partners. This can come in handy if you're in a public area with curious Bluetooth-bearing strangers.

  4. #4
    Join Date
    Feb 2008
    Posts
    2,635

    Re: Encryption type for Bluetooth security

    The Bluetooth specification 1.0 describes the link encryption algorithm as a stream cipher using 4 LFSR.
    LFSR - Linear Feedback Shift Registers
    .

    The sum of the width of the LFSRs is 128, and the spec says "the effective key length is selectable between 8 and 128 bits". This arrangement allows Bluetooth to be used in countries with regulations limiting encryption strength, and "facilitate a future upgrade path for the security without the need for a costly redesign of the algorithms and encryption hardware" according to the Bluetooth specification.

    Key generation and authentication seems to be using the 8-round SAFER+ encryption algorithm.

    The information available suggests that Bluetooth security will be adequate for most purposes; but users with higher security requirements will need to employ stronger algorithms to ensure the security of their data.

Similar Threads

  1. Replies: 3
    Last Post: 24-04-2013, 03:57 PM
  2. Replies: 5
    Last Post: 19-12-2011, 09:02 PM
  3. Is there risk factor despite encryption in WLAN security?
    By Nikah Ulana in forum Networking & Security
    Replies: 5
    Last Post: 14-02-2011, 06:25 PM
  4. Encryption and security on uTorrent?
    By Osvaldo in forum Windows Software
    Replies: 6
    Last Post: 21-06-2010, 09:08 AM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,713,560,987.27722 seconds with 17 queries