{"id":6260,"date":"2019-08-25T23:32:28","date_gmt":"2019-08-25T23:32:28","guid":{"rendered":"https:\/\/gtechbooster.com\/?p=6260"},"modified":"2023-04-01T01:36:50","modified_gmt":"2023-04-01T01:36:50","slug":"bluetooth-encryption-broken","status":"publish","type":"post","link":"https:\/\/gtechbooster.com\/bluetooth-encryption-broken\/","title":{"rendered":"Bluetooth encryption broken"},"content":{"rendered":"\n<p>Researchers have broken Bluetooth&#8217;s encryption key negotiation \nprotocol using an attack they&#8217;ve called KNOB &#8211; Key Negotiation Of \nBluetooth. The vulnerability affects almost all devices that support \nBluetooth, but Google has already announced patches for Android devices.<\/p>\n\n\n\n<div class=\"gtech-migrated-from-ad-inserter-placement-2\" style=\"text-align: center;\" id=\"gtech-1312289113\"><div style=\"margin-right: auto;margin-left: auto;text-align: center;\" id=\"gtech-743987797\"><a data-bid=\"1\" data-no-instant=\"1\" href=\"https:\/\/gtechbooster.com\/linkout\/76065\" rel=\"noopener\" class=\"notrack\" aria-label=\"26002\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gtechbooster.com\/media\/2025\/10\/26002.jpg\" alt=\"\"  srcset=\"https:\/\/gtechbooster.com\/media\/2025\/10\/26002.jpg 1200w, https:\/\/gtechbooster.com\/media\/2025\/10\/26002-768x768.jpg 768w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"500\" height=\"500\"  style=\"display: inline-block;\" \/><\/a><\/div><\/div><p>The vulnerability was reported in a paper given at this year&#8217;s USENIX  Security Symposium in California. The researchers, Kasper B. Rasmussen  from Oxford University, Daniele Antonioli of Singapore University of  Technology, and Nils Ole Tippenhauer of the CISPA Helmholtz Center for  Information Security, gave a paper on how a brute-force attack can be  used to target a weakness in the firmware of a Bluetooth chip to let  hackers set up a man-in-the-middle attack using packet injection. The  attack can then be used to gain access to sensitive data.<\/p>\n\n\n\n<p>The researchers say the attack can be carried out without any \nknowledge of encryption keys, and the way it works is to make Bluetooth \nusers rely an encryption key with only 1 byte of entropy &#8211; keys that are\n one character long. While such keys do secure a Bluetooth-paired \nconnection, they&#8217;re susceptible to a brute-force attack. Most Bluetooth \nconnections would use a longer key, but Bluetooth doesn&#8217;t check for \nchanges in the entropy of encryption keys, and the pre-pairing stage \nisn&#8217;t encrypted.<\/p>\n\n\n\n<p>The entropy negotiation is performed over the Link Manager Protocol \n(LMP), and it is transparent to the Bluetooth users because LMP packets \nare managed by the firmware of the Bluetooth chips and they are not \npropagated to higher layers. In the negotiation, the first device \nsuggests a key length for encryption, and the second device accepts \nwhatever key length is suggested. This means that if an attacker finds a\n way to intercept the non-encrypted negotiation and alter the key \nlength, the devices will both use the shorter key. The attacker can then\n use brute force to crack the negotiated encryption keys, decrypt the \ninformation being exchanged, and inject valid encrypted messages in \nrealtime.<\/p>\n\n\n\n<p>The attack goes undetected because the encryption key negotiation is transparent to the Bluetooth users, and is:<\/p><div class=\"gtech-mid-cont\" style=\"text-align: center;\" id=\"gtech-1554301936\"><div style=\"margin-left: auto;margin-right: auto;text-align: center;\" id=\"gtech-4277072156\"><a data-bid=\"1\" data-no-instant=\"1\" href=\"https:\/\/gtechbooster.com\/linkout\/78735\" rel=\"noopener\" class=\"notrack\" aria-label=\"005\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gtechbooster.com\/media\/2026\/03\/005.webp\" alt=\"\"  srcset=\"https:\/\/gtechbooster.com\/media\/2026\/03\/005.webp 1000w, https:\/\/gtechbooster.com\/media\/2026\/03\/005-768x768.webp 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" width=\"500\" height=\"500\"  style=\"display: inline-block;\" \/><\/a><\/div><\/div>\n\n\n\n<p><em> &#8220;standard-compliant because all \nBluetooth BR\/EDR versions require to support encryption keys with \nentropy between 1 and 16 bytes and do not secure the key negotiation \nprotocol. As a result, the attacker completely breaks Bluetooth BR\/EDR \nsecurity without being detected.&#8221;<\/em><\/p>\n\n\n\n<p>Implementing such an attack would require devices such as a Bluetooth\n protocol analyzer along with a brute force script. It would still be \ndifficult to difficult such an attack, but the researchers said it would\n also be possible for a firmware attack where the firmware of the \nBluetooth chip of a single victim would be compromised using techniques \nsuch as backdoors, supply-chain implants, or rogue chip manufacturers.<\/p>\n\n\n\n<p>Before giving the paper, the researchers had explained their findings\n to the Bluetooth Special Interest Group (SIG) along with other bodies \nincluding the the International Consortium for Advanced Cybersecurity on\n the Internet. SIG says it has updated the Bluetooth Core Specification \nto recommend the use of encryption keys with a minimum of 7 bytes of \nentropy. Manufacturers of devices using Bluetooth are putting out \nupdates.<\/p>\n\n\n\n<p>The researchers tested 17 Bluetooth chips from Apple, Broadcom, \nChicony, Intel and Qualcomm, and found they were all susceptible to \nattack. The full list can be&nbsp;<a href=\"https:\/\/www.kb.cert.org\/vuls\/id\/918987\/\" target=\"_blank\" rel=\"noreferrer noopener\">read online<\/a>.<\/p>\n\n\n\n<p>At the time of writing, Blackberry included a patch for its Android  devices in June, and Google included the patch in its August 5 Android  update.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">More Information<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/www.usenix.org\/system\/files\/sec19-antonioli.pdf\">Research Paper<\/a><\/li><\/ul>\n<div class=\"gtech-end-cont\" id=\"gtech-2193066359\"><div style=\"margin-right: auto;margin-left: auto;text-align: center;\" id=\"gtech-1769930948\"><a data-bid=\"1\" data-no-instant=\"1\" href=\"https:\/\/gtechbooster.com\/linkout\/75343\" rel=\"noopener\" class=\"notrack\" aria-label=\"jesdphis\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gtechbooster.com\/media\/2025\/08\/jesdphis.avif\" alt=\"\"  srcset=\"https:\/\/gtechbooster.com\/media\/2025\/08\/jesdphis.avif 1179w, https:\/\/gtechbooster.com\/media\/2025\/08\/jesdphis-768x950.avif 768w\" sizes=\"(max-width: 1179px) 100vw, 1179px\" width=\"300\" height=\"300\"  style=\"display: inline-block;\" \/><\/a><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Researchers have broken Bluetooth&#8217;s encryption key negotiation protocol using an attack they&#8217;ve called KNOB &#8211; Key Negotiation Of Bluetooth. The vulnerability affects almost all devices that support Bluetooth, but Google has already announced patches for Android devices. The vulnerability was reported in a paper given at this year&#8217;s USENIX Security Symposium in California. The researchers, [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":6261,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1915],"tags":[133,1444,236,981,681],"class_list":["post-6260","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ndocs","tag-bluetooth","tag-cyber-security","tag-data-security","tag-network-security","tag-research"],"blocksy_meta":{"styles_descriptor":{"styles":{"desktop":"","tablet":"","mobile":""},"google_fonts":[],"version":6}},"_links":{"self":[{"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/posts\/6260","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/comments?post=6260"}],"version-history":[{"count":0,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/posts\/6260\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/media\/6261"}],"wp:attachment":[{"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/media?parent=6260"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/categories?post=6260"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/tags?post=6260"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}