Firmware Insider: Bluetooth Randomness is Mostly Random
Bluetooth chips must include a Random Number Generator (RNG). This RNG is used internally within cryptographic primitives but also exposed to the operating system for chip-external applications. In general, it is a black box with security-critical authentication and encryption mechanisms depending o...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Bluetooth chips must include a Random Number Generator (RNG). This RNG is
used internally within cryptographic primitives but also exposed to the
operating system for chip-external applications. In general, it is a black box
with security-critical authentication and encryption mechanisms depending on
it. In this paper, we evaluate the quality of RNGs in various Broadcom and
Cypress Bluetooth chips. We find that the RNG implementation significantly
changed over the last decade. Moreover, most devices implement an insecure
Pseudo-Random Number Generator (PRNG) fallback. Multiple popular devices, such
as the Samsung Galaxy S8 and its variants as well as an iPhone, rely on the
weak fallback due to missing a Hardware Random Number Generator (HRNG). We
statistically evaluate the output of various HRNGs in chips used by hundreds of
millions of devices. While the Broadcom and Cypress HRNGs pass advanced tests,
it remains indistinguishable for users if a Bluetooth chip implements a secure
RNG without an extensive analysis as in this paper. We describe our measurement
methods and publish our tools to enable further public testing. |
---|---|
DOI: | 10.48550/arxiv.2006.16921 |