Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU |
As I understand it, the Bluetooth specs include decent cryptography, including a pass phrase mechanism that allows for reasonably long pass phrases. However, most peripheral vendors don't allow the user to supply their own pass phrase, and instead hard-wire the pass phrase at the factory, often to "0000". They also try to shape consumer expectations by calling it a "PIN" instead of a "pass phrase". On Thu, Jan 20, 2011 at 2:12 PM, Tom Metro <tmetro-blu-5a1Jt6qxUNc at public.gmane.org> wrote: > Matthew Gillen wrote: > > I can't bring myself to use a wireless keyboard. I just don't like the > > idea of broadcasting my passwords out to anyone within listening > > distance. > > The Security Now podcast has covered the security of wireless keyboards > a few times. In episode 269 Steve Gibson says: > > ...the wireless keyboards have such weak security that essentially, > when you turn the keyboard on, it chooses an eight-bit byte randomly > and XORs the data that's being sent with that byte. ...the data is > not technically in the clear. It's not plaintext. But, boy, I mean, > it would just be a fun and relatively short exercise to decrypt that > stream. It would be trivial to decrypt it. ... So the encryption of > wireless keyboards is virtually ineffective. > > And in episode 271 he says: > > Yeah, I wanted to quickly calm everyone's nerves over the issue of > keyboard security. ... I did some research, read some whitepapers and > some security evaluations and so forth. And the good news is Logitech > got it 100 percent correct. They did a beautiful job. ... There's > nonvolatile memory in the keyboard and in what they call their little > unifying receiver. This is Logitech's new technology. > > So at the factory, nonvolatile memory in the keyboard and in the > unifying receiver are synchronized with the same 128-bit symmetric > key, which the AES algorithm uses to encrypt keystrokes. So if you > repair the keyboard, because for example you might pair it with a > different receiver that hasn't seen that keyboard before, the pairing > process does exactly the right thing. There are pseudorandom number > generators at each end. They're able to establish a new key without > it ever going over the wire, over the air, in the clear, in order to > synchronize a new key that they agree upon on the fly. That's written > into nonvolatile RAM and kept there. > > ...I haven't looked at anybody else's. But I know that the unifying > receiver technology that Logitech has is doing this. And it does say > in the specs, just in the regular top-level specs, 128-bit AES > encryption. So that's the way they implemented it. I would imagine > anything that Logitech has done, even if it's not the K320 wireless > keyboard, that also says that would be using the same technology, > which means you can trust it. > > So the level of security depends on the keyboard, with at least some of > the newer models having adequate security. > > And elsewhere in that episode: > > ...anything Bluetooth is, well, okay. Anything Bluetooth is way more > secure than a simple 8-bit XOR, if for no other reason than almost > nothing could be less secure than an 8-bit XOR. ... Bluetooth is good > security, very good security. > > Episodes 280 and 283 cover BlueTooth in depth. (I haven't listened to > them yet.) > > > Episode 269: > transcript: http://www.grc.com/sn/sn-269.txt > audio: http://media.grc.com/sn/sn-269.mp3 > > Episode 271: > transcript: http://www.grc.com/sn/sn-271.txt > audio: http://media.grc.com/sn/sn-271.mp3 > > Other episodes: > http://www.grc.com/securitynow.htm > > -Tom > > -- > Tom Metro > Venture Logic, Newton, MA, USA > "Enterprise solutions through open source." > Professional Profile: http://tmetro.venturelogic.com/ > _______________________________________________ > Discuss mailing list > Discuss-mNDKBlG2WHs at public.gmane.org > http://lists.blu.org/mailman/listinfo/discuss > -- John Abreau / Executive Director, Boston Linux & Unix GnuPG KeyID: 0xD5C7B5D9 / Email: abreauj-Re5JQEeQqe8AvxtiuMwx3w at public.gmane.org GnuPG FP: 72 FB 39 4F 3C 3B D6 5B E0 C8 5A 6E F1 2C BE 99
BLU is a member of BostonUserGroups | |
We also thank MIT for the use of their facilities. |