<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Questions about LESC, MITM and passkey</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/35856/questions-about-lesc-mitm-and-passkey</link><description>Hi! I am using SDK15 to develop an application for nordic chip which won&amp;#39;t be using any kind of display nor keyboard input, so probably I&amp;#39;m gonna go for static passkey option. I can&amp;#39;t also use OOB. 
 My requirements are to: a) authenticate devices wanting</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Thu, 28 Jun 2018 15:13:42 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/35856/questions-about-lesc-mitm-and-passkey" /><item><title>RE: Questions about LESC, MITM and passkey</title><link>https://devzone.nordicsemi.com/thread/138175?ContentTypeID=1</link><pubDate>Thu, 28 Jun 2018 15:13:42 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:f1eff945-fff2-4351-9630-eca77f385f71</guid><dc:creator>Kenneth</dc:creator><description>&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;You can find some guidelines here on BLE security:&lt;br /&gt;&lt;a href="https://www.bluetooth.com/~/media/files/specification/bluetooth-low-energy-security.ashx"&gt;https://www.bluetooth.com/~/media/files/specification/bluetooth-low-energy-security.ashx&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Our latest nRF5 SDKv15 should contain various examples that show bonding from just works to lesc.&lt;/p&gt;
&lt;p&gt;What is important to understand is that the only potential weakness is if someone is sniffing when the initial bonding occurs, and the level of weakness then depending on the capabilities and bonding procedure used. A sniffer may be able to get the long term key that is used for all later communication and encryption if using passkey (can be brute forced) or just works.&lt;/p&gt;
&lt;p&gt;However if the sniffer is not present during the bonding procedure, then all communication is equally safe, since all bonding procedures generate a&amp;nbsp;128bit long term key which can&amp;#39;t be cracked or brute-forced.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The link can only be encrypted by two devices that have been previously bonded re-establish connection, and it&amp;#39;s only then they may exchange data.&lt;/p&gt;
&lt;p&gt;Best regards,&lt;br /&gt;Kenneth&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>