<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>What cause the MIC wrong???</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/2224/what-cause-the-mic-wrong</link><description>Hi, 
 I catched the air data packets by Sniffer and it shown that there was an error, MIC incorrect, which could be seen as followed, and the whole packet was malformed.
I am not clear about this. After the bonding ended successfully, the neccessary</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Mon, 14 Apr 2014 14:45:39 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/2224/what-cause-the-mic-wrong" /><item><title>RE: What cause the MIC wrong???</title><link>https://devzone.nordicsemi.com/thread/9383?ContentTypeID=1</link><pubDate>Mon, 14 Apr 2014 14:45:39 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:59308b16-17ae-4099-9e1c-f97ab2eb5b6f</guid><dc:creator>David Edwin</dc:creator><description>&lt;p&gt;I am saying, if you want the sniffer to capture data properly in an encrypted connection, use the sniffer when the devices are getting bonded. This is just how the sniffer works. Data captured without the sniffer getting bonde should not be used in any encryption analysis.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: What cause the MIC wrong???</title><link>https://devzone.nordicsemi.com/thread/9382?ContentTypeID=1</link><pubDate>Mon, 14 Apr 2014 14:07:35 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:fe19d25b-7b79-4289-9501-2d619e27a5ec</guid><dc:creator>jimlin</dc:creator><description>&lt;p&gt;So, you mean this is not really wrong about data? As my found, when the slave sends data to the host from the bonding beginning, the interval of two points slave sends is about 8ms. But once restart with bonded, the interval become bigger to 10ms. I assume the key make the interval bigger.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: What cause the MIC wrong???</title><link>https://devzone.nordicsemi.com/thread/9381?ContentTypeID=1</link><pubDate>Mon, 14 Apr 2014 13:41:37 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:5e2445ff-fbf4-469c-befc-d881282ecceb</guid><dc:creator>David Edwin</dc:creator><description>&lt;p&gt;The sniffer will remember the keys if and only if it was used to sniff the initial bonding process between the 2 devices. You are most likely trying to sniff a connection that was bonded earlier but the sniffer was not used to sniff the connection when the bonding was done.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>