SLIDE 52 The Fully-Active Attack – Phase 4
The following diagram describes the attack considering DHKeya = PKb′.
Device A Attacker Device B Compute the LTK and MacKey MacKeya LTKa = f5(DHKeya = PKb′, Na, Nb, A, B) Compute the LTK and MacKey MacKeyb LTKb = f5(DHKeyb, Na, Nb, A, B) Compute Ea = f6(MacKeya, Na, Nb, rb, IOcapA, A, B) Compute Eb = f6(MacKeyb, Nb, Na, ra, IOcapB, B, A) Arbitrarily guess the value of DHKeyb to be DHKey′
b
∈ {PKa′, ∞} Ea Ea′ Compute MacKey′
b LTK′ b = f5(DHKey′ b, Na, Nb, A, B)
Ea′ = f6(MacKey′
b, Na, Nb, rb, IOcapA, A, B).
Eli Biham, Lior Neumann (Technion) Breaking the Bluetooth Pairing Cryptoday 2018 29 / 44