
A.3 Decrypting Encrypted Bluetooth
®
data with ComProbe BPA 600
A.3.1 How Encryption Works in
Bluetooth
Bluetooth
devices on an encrypted link share a common “link key” used to exchange encrypted data. How
that link key is created depends on the paring method. Paring methods have evolved and changed throughout
Bluetooth
history. The earlier legacy method was used up through
Bluetooth
2.0. Improved and simpler
pairing methods began with Bluetooth 2.1 and remain in the current version
Bluetooth
4.0.
For a
Bluetooth
sniffer to be able to decrypt the encrypted data, it must also have this shared link key. For
obvious security reasons, the link key is never sent over the air, so either the user must get the key out of one
of the devices being sniffed and supply the key to the sniffer or the sniffer must create the key itself.
A.3.2 Legacy Pairing (
Bluetooth
2.0 and earlier)
In legacy pairing, this link key is derived from a shared PIN code, the master’s
Bluetooth
clock, the master’s
BD_ADDR and a random number that is passed between the two devices. If the sniffer has all of this same
data, it can create the link key in the same way that the devices do. The sequence of events used to create
this key, or pairing process, is shown in the ComProbe software Frame Display below.
Frontline BPA 600 Hardware & Software User Manual
303
Summary of Contents for Frontline BPA 600
Page 1: ...Hardware and Software User Manual Revision Date 3 14 2017...
Page 304: ...TELEDYNE LECROY Appendicies 296 Frontline BPA 600 Hardware Software User Manual...
Page 310: ...TELEDYNE LECROY Appendicies 302 Frontline BPA 600 Hardware Software User Manual...
Page 318: ...TELEDYNE LECROY Appendicies 310 Frontline BPA 600 Hardware Software User Manual...
Page 328: ...TELEDYNE LECROY Appendicies 320 Frontline BPA 600 Hardware Software User Manual...
Page 340: ......
Page 348: ...340 Frontline BPA 600 Hardware Software User Manual Appendicies...