Mobility

Zero-Knowledge-Like Proof of Cryptanalysis of Bluetooth Encryption

Download Now Free registration required

Executive Summary

This paper presents a protocol aiming at proving that an encryption system contains structural weaknesses without disclosing any information on those weaknesses. A verifier can check in a polynomial time that a given property of the cipher system output has been effectively realized. This property has been chosen by the prover in such a way that it cannot be achieved by known attacks or exhaustive search but only if the prover indeed knows some undisclosed weaknesses that may effectively endanger the cryptosystem security.

  • Format: PDF
  • Size: 742.8 KB