Bluetooth Security Component and Protocol
Bluetooth Security Component and Protocol
3. The security algorithms use the public identity of a device, a secret private user
key, and an internally generated random key as input parameters.
7. To set up trust between the two devices a user can enter a secret PIN into both
devices. This PIN can have a length of up to 16 byte.
8. Based on the PIN, the device address, and random numbers, several keys can be
computed which can be used as link key for authentication .
10.Based on the link key, values generated during the authentication, and again a
random number, an encryption key is generated during the encryption stage of the
security architecture. This key has a maximum size of 128 bits and can be
individually generated for each transmission .
11.Based on the encryption key, the device address and the current clock, a payload
key is generated for ciphering user data. The payload key is a stream of pseudo-
random bits.
12.The ciphering process is a simple XOR of the user data and the payload key.
2. Some of the keys are permanently stored on the devices and the quality
of the random number generators has not been specified.