<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>KNOB Attack for BLE (nRF52840)</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/54566/knob-attack-for-ble-nrf52840</link><description>Hi Experts, 
 
 We are developing application on nRF52840 based BLE 5.0 module i.e. BMD-340, in short we are integrating the BLE in one of our existing product &amp;amp; upcoming new products. 
 We have found information about KNOB attack on BLE. 
 Does Nordic</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Mon, 01 Mar 2021 07:24:04 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/54566/knob-attack-for-ble-nrf52840" /><item><title>RE: KNOB Attack for BLE (nRF52840)</title><link>https://devzone.nordicsemi.com/thread/296747?ContentTypeID=1</link><pubDate>Mon, 01 Mar 2021 07:24:04 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:b0f6fea3-23c9-4d6b-a211-5b6acd07364c</guid><dc:creator>bjorn-spockeli</dc:creator><description>&lt;p&gt;&lt;a href="https://devzone.nordicsemi.com/members/robla"&gt;robla&lt;/a&gt;:&amp;nbsp; Apologies for the very late reply.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;I see that I didnt complete the sentence fully. YOu are correct that 7 bytes is equivalent to a 56-bit key.&amp;nbsp; I should have written the following:&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Simply set the&amp;nbsp;SEC_PARAM_MIN_KEY_SIZE to 16 and you will remove the possibility of reducing the encryption key size from 16 to 7. However, a minimum key size of 7 bytes&amp;nbsp;will ensure that the device is not affected by the KNOB attack where the key size is set to 1. With a key size of 16, you will ensure that only a 128-bit encryption key is used, which would take&amp;nbsp;2.158⋅10^12 years , i.e.&amp;nbsp; 2,158,000,000,000 years to bruteforce.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: KNOB Attack for BLE (nRF52840)</title><link>https://devzone.nordicsemi.com/thread/268990?ContentTypeID=1</link><pubDate>Thu, 10 Sep 2020 12:59:25 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:af08fba3-019d-404f-bd80-97109b915a98</guid><dc:creator>robla</dc:creator><description>&lt;p&gt;Hi&amp;nbsp;&lt;a href="https://devzone.nordicsemi.com/members/bjorn_2d00_spockeli"&gt;bjorn-spockeli&lt;/a&gt;,&lt;/p&gt;
&lt;p&gt;I have the same challenges and questions as the original poster. I am trying to decide what the minimum key length should be for our device.&lt;/p&gt;
&lt;p&gt;In one of your answers you state that &amp;quot;&lt;span&gt;a minimum key size of 7 bytes&amp;nbsp;will ensure that &amp;nbsp; a 128-bit encryption key is used&amp;quot;. &lt;br /&gt;&lt;/span&gt;&lt;span&gt;Can you explain the details of that? Isn&amp;#39;t 7 bytes equal to 56 bits key length?&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Regards,&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Robert&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: KNOB Attack for BLE (nRF52840)</title><link>https://devzone.nordicsemi.com/thread/237371?ContentTypeID=1</link><pubDate>Mon, 02 Mar 2020 10:14:06 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:0a8185e8-f3d1-4a28-b934-4cdb28c7646b</guid><dc:creator>bjorn-spockeli</dc:creator><description>&lt;p&gt;Bluetooth Low Energy uses AES-128 encryption with a minimum key size of 7 bytes.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The link is encrypted when you receive the BLE_GAP_EVT_CONN_SEC_UPDATE and BLE_GAP_EVT_AUTH_STATUS, see&amp;nbsp;&lt;a class="el" href="https://infocenter.nordicsemi.com/topic/com.nordic.infocenter.s140.api.v7.0.1/group___b_l_e___g_a_p___p_e_r_i_p_h___l_e_s_c___b_o_n_d_i_n_g___n_c___m_s_c.html"&gt;Bonding: Numeric Comparison&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;All data sent after these events will be encrypted with AES-128.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Best regards&lt;/p&gt;
&lt;p&gt;Bj&amp;oslash;rn&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: KNOB Attack for BLE (nRF52840)</title><link>https://devzone.nordicsemi.com/thread/237359?ContentTypeID=1</link><pubDate>Mon, 02 Mar 2020 09:39:41 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:1ef37ac2-719b-44d9-8c1d-006fe29ff8ff</guid><dc:creator>DevSec</dc:creator><description>&lt;p&gt;Hi Bjorn,&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;What is the default encryption mode used to transfer data from BLE to mobile app?&lt;/p&gt;
&lt;p&gt;How we can verify that the data is encrypted before sending it to Mobile app?&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Regards,&lt;/p&gt;
&lt;p&gt;Yunus&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: KNOB Attack for BLE (nRF52840)</title><link>https://devzone.nordicsemi.com/thread/230338?ContentTypeID=1</link><pubDate>Wed, 22 Jan 2020 12:36:53 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:de574e37-2ed5-443d-8c3e-c8b9cf69b7cc</guid><dc:creator>bjorn-spockeli</dc:creator><description>&lt;p&gt;The integration folder contains our legacy driver .c and .h files, all which have a Nordic 5-clause license.&lt;/p&gt;
&lt;p&gt;The modules folder contain the new nrfx HAL and driver files ( Nordic 5-clause license)in addition to chip specific start up files(Apache 2 liscence). There are no GPL references there.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Lastly the external folder, there is a single reference to GPL in&amp;nbsp;\external\fatfs\doc\en\appnote.html, but other than that there is no references to GPL.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;You will have to go through your application and see which of these external modules you are using and then evaluate each individual license. Segger RTT is used for logging or CLI communication.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Best regards&lt;/p&gt;
&lt;p&gt;Bjørn&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: KNOB Attack for BLE (nRF52840)</title><link>https://devzone.nordicsemi.com/thread/230332?ContentTypeID=1</link><pubDate>Wed, 22 Jan 2020 12:11:31 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:e0211f77-14c7-40f1-959b-5dff6d8e7a24</guid><dc:creator>DevSec</dc:creator><description>&lt;p&gt;It is showing for all the files inside the integration,&amp;nbsp;modules &amp;amp;&amp;nbsp;segger_rtt directories.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: KNOB Attack for BLE (nRF52840)</title><link>https://devzone.nordicsemi.com/thread/230324?ContentTypeID=1</link><pubDate>Wed, 22 Jan 2020 11:56:06 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:36e3bd7f-b525-49ea-ba6e-99367b591700</guid><dc:creator>bjorn-spockeli</dc:creator><description>&lt;p&gt;Which files does the&amp;nbsp;&lt;span&gt;Black Duck scan software consider high risk w.r.t. licensing?&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: KNOB Attack for BLE (nRF52840)</title><link>https://devzone.nordicsemi.com/thread/230318?ContentTypeID=1</link><pubDate>Wed, 22 Jan 2020 11:52:24 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:24b217a2-c2b2-452a-8f7a-a6a33943d4ae</guid><dc:creator>DevSec</dc:creator><description>&lt;p&gt;Hi Bjorn,&lt;/p&gt;
&lt;p&gt;We are getting License Risk after running the Bluetooth firmware in the Black Duck scan software. There are other security risk &amp;amp; operational risk we identified in scan but License risk is critical for us &amp;amp; need your help/direction to resolve this License Risk.&lt;/p&gt;
&lt;p&gt;Its GPL-2.0+ License Risk which is high risk in the application firmware. How we can resolve this risk?&lt;/p&gt;
&lt;p&gt;Please is the screen short for the same.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;img alt=" " src="https://devzone.nordicsemi.com/resized-image/__size/320x240/__key/communityserver-discussions-components-files/4/0523.Scan.PNG" /&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Regards,&lt;/p&gt;
&lt;p&gt;Yunus&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: KNOB Attack for BLE (nRF52840)</title><link>https://devzone.nordicsemi.com/thread/227187?ContentTypeID=1</link><pubDate>Thu, 02 Jan 2020 08:04:04 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:a301370f-f319-4d41-8fce-3c30a5f5fc5e</guid><dc:creator>bjorn-spockeli</dc:creator><description>&lt;p&gt;Hi Yunus,&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Apologize for the late reply.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;If you&amp;#39;re only using the nRF52840 in a Bluetooth Low Energy application, then you can remove the unused SoftDevice hex files, the unused libraries and drivers as well as examples from the SDK directory. Note: If there are files in the SDK directory that are not referenced in your applications project, then it will not be linked in to the final binary, so you do not delete the unused files in the SDK directory.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;You should be able to see which files that linked into your application by looking at the .map file that is generated when you compile the application.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Best regards&lt;/p&gt;
&lt;p&gt;Bj&amp;oslash;rn&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: KNOB Attack for BLE (nRF52840)</title><link>https://devzone.nordicsemi.com/thread/226714?ContentTypeID=1</link><pubDate>Mon, 23 Dec 2019 10:45:12 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:0b292bfb-316c-4966-86cc-a6fcd6156a23</guid><dc:creator>DevSec</dc:creator><description>&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Do you have any update on above queries?&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Regards,&lt;/p&gt;
&lt;p&gt;Yunus&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: KNOB Attack for BLE (nRF52840)</title><link>https://devzone.nordicsemi.com/thread/226343?ContentTypeID=1</link><pubDate>Thu, 19 Dec 2019 11:02:34 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:48d4fb6c-1395-4aa2-b6b8-c75438dab79c</guid><dc:creator>DevSec</dc:creator><description>&lt;p&gt;Hi Bjorn,&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Appreciate your continues support.&lt;/p&gt;
&lt;p&gt;We are almost done with our application development. Now we are working on code cleanup &amp;amp; testing, so need some clarification.&lt;/p&gt;
&lt;p&gt;Can we have rights to modify or delete the nRF52840 libraries,&amp;nbsp; softdevice files, components etc. those are not used in our Bluetooth application?&lt;/p&gt;
&lt;p&gt;Some of the components are useless for us like ant, iot, nfc 802_15_4 etc.&lt;/p&gt;
&lt;p&gt;Some of the softdevice files we are not using, so can we delete that?&lt;/p&gt;
&lt;p&gt;Can you suggest minimum files/components/modules/libraries required for Bluetooth application development?&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Regards,&lt;/p&gt;
&lt;p&gt;Yunus&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: KNOB Attack for BLE (nRF52840)</title><link>https://devzone.nordicsemi.com/thread/225177?ContentTypeID=1</link><pubDate>Thu, 12 Dec 2019 13:55:09 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:ee5182e8-e8bd-4c22-b836-4a9e30779c65</guid><dc:creator>bjorn-spockeli</dc:creator><description>&lt;p&gt;Hi Yunus,&lt;/p&gt;
[quote user="DevSec"]Making&amp;nbsp;SEC_PARAM_MIN_KEY_SIZE to 16 byte will affect on BLE performance? [/quote]
&lt;p&gt;the AES encryption is accelerated by dedicated hardware so you should not see any noticeable effect of the increase key size on the achievable throughput of the BLE link.&amp;nbsp;&lt;/p&gt;
[quote user="DevSec"]Do we need to take care from the mobile side as well?[/quote]
&lt;p&gt;No, this will be handled automatically by the central device. If the peripheral states that the minimum key size is 16, then the central must use this.&lt;/p&gt;
&lt;p&gt;Best regards&lt;/p&gt;
&lt;p&gt;Bjørn&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: KNOB Attack for BLE (nRF52840)</title><link>https://devzone.nordicsemi.com/thread/225066?ContentTypeID=1</link><pubDate>Thu, 12 Dec 2019 06:23:46 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:bb1ed1e2-8b31-4aee-990d-546f0af073a9</guid><dc:creator>DevSec</dc:creator><description>&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;I changed&amp;nbsp;&lt;span&gt;SEC_PARAM_MIN_KEY_SIZE to 16 &amp;amp; I am able to pair the BLE with Android mobile app (Yet to test on other other android &amp;amp; iPhone).&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Making&amp;nbsp;SEC_PARAM_MIN_KEY_SIZE to 16 byte will affect on BLE performance? Do we need to take care from the mobile side as well?&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Regards,&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Yunus&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: KNOB Attack for BLE (nRF52840)</title><link>https://devzone.nordicsemi.com/thread/223465?ContentTypeID=1</link><pubDate>Wed, 04 Dec 2019 05:03:41 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:6856f790-d5d6-45aa-bab0-009f831a412c</guid><dc:creator>bjorn-spockeli</dc:creator><description>&lt;p&gt;Hi Yunus,&amp;nbsp;&lt;/p&gt;
[quote user="DevSec"]- What all default security features implemented in BMD-340, please point me the portion of the code.[/quote]
&lt;p&gt;We set the minimum and maximum key size used for security procedures when intializing the peer manager module in our examples and the min and max size is set to 7 and 16 respectively, see below.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;pre class="ui-code" data-mode="c_cpp"&gt;#define SEC_PARAM_MIN_KEY_SIZE              7                                          /**&amp;lt; Minimum encryption key size. */
#define SEC_PARAM_MAX_KEY_SIZE              16                                         /**&amp;lt; Maximum encryption key size. */

static void peer_manager_init(void)
{
    ble_gap_sec_params_t sec_param;
    ret_code_t           err_code;

    err_code = pm_init();
    APP_ERROR_CHECK(err_code);

    memset(&amp;amp;sec_param, 0, sizeof(ble_gap_sec_params_t));

    // Security parameters to be used for all security procedures.
    sec_param.bond           = SEC_PARAM_BOND;
    sec_param.mitm           = SEC_PARAM_MITM;
    sec_param.lesc           = SEC_PARAM_LESC;
    sec_param.keypress       = SEC_PARAM_KEYPRESS;
    sec_param.io_caps        = SEC_PARAM_IO_CAPABILITIES;
    sec_param.oob            = SEC_PARAM_OOB;
    sec_param.min_key_size   = SEC_PARAM_MIN_KEY_SIZE;
    sec_param.max_key_size   = SEC_PARAM_MAX_KEY_SIZE;
    sec_param.kdist_own.enc  = 1;
    sec_param.kdist_own.id   = 1;
    sec_param.kdist_peer.enc = 1;
    sec_param.kdist_peer.id  = 1;

    err_code = pm_sec_params_set(&amp;amp;sec_param);
    APP_ERROR_CHECK(err_code);

    err_code = pm_register(pm_evt_handler);
    APP_ERROR_CHECK(err_code);
}
&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
[quote user="DevSec"]-&amp;nbsp;Do we need to take care of an extra security features in the application development?[/quote]
&lt;p&gt;The countermeasures stated in the research article are as follows:&lt;/p&gt;
&lt;p&gt;&lt;em&gt;A non legacy compliant countermeasure is to secure the encryption key negotiation using the link key (KL). The link key is a shared, and possibly authenticated, secret that should be always available before starting the entropy negotiation protocol. As the attacker should not be able to modify the victims’ entropy proposals, the new encryption key negotiation protocol must provide message integrity and optional message confidentiality generating fresh keys from the link key. Preferably, the specification should get rid of the entropy negotiation protocol, and always use encryption keys with a fixed amount of entropy, e.g., 16 bytes. The implementation of these countermeasures only requires the modification of the Bluetooth controller component. &lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Simply set the&amp;nbsp;SEC_PARAM_MIN_KEY_SIZE to 16 and you will remove the possibility of reducing the encryption key size from 16 to 7. However, a minimum key size of 7 bytes&amp;nbsp;will ensure that the device is not affected by the KNOB attack where the key size is set to 1. With a key size of 16, you will ensure that only a 128-bit encryption key is used, which would take&amp;nbsp;2.158⋅10^12 years , i.e.&amp;nbsp; 2,158,000,000,000 years to bruteforce.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Hence, this is why we are stating that this vulnerability is only practically exploitable for BR/EDR devices where the minimum encryption key size can be set below 7 bytes.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
[quote user="DevSec"]- Do you have security compliance certificate where you are making sure that KNOB attack will not be possible?&amp;nbsp; &amp;nbsp;[/quote]
&lt;p&gt;&amp;nbsp;Ref. my comment above, the minimum encryption key used is a 128-bit AES key, which is generally regarded as the “&lt;br /&gt;gold standard” for encrypting data.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: KNOB Attack for BLE (nRF52840)</title><link>https://devzone.nordicsemi.com/thread/223463?ContentTypeID=1</link><pubDate>Wed, 04 Dec 2019 04:28:35 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:15805618-d679-40fa-88c9-f7b834f3d781</guid><dc:creator>DevSec</dc:creator><description>&lt;p&gt;Hi Bjorn,&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;This &lt;a href="https://eprint.iacr.org/2019/933.pdf"&gt;KNOB attack&lt;/a&gt; document explain about BLE KNOB attack even though the minimum key length&amp;nbsp;&lt;span&gt;&amp;gt;=7 bytes.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Our team needs more clarity from the security front. Can you please clarify on below points,&lt;/p&gt;
&lt;p&gt;- What all default security features implemented in BMD-340, please point me the portion of the code.&lt;/p&gt;
&lt;p&gt;-&amp;nbsp;Do we need to take care of an extra security features in the application development?&lt;/p&gt;
&lt;p&gt;- Do you have security compliance certificate where you are making sure that KNOB attack will not be possible?&amp;nbsp; &amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Appreciate your support.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Regards,&lt;/p&gt;
&lt;p&gt;Yunus&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: KNOB Attack for BLE (nRF52840)</title><link>https://devzone.nordicsemi.com/thread/220837?ContentTypeID=1</link><pubDate>Tue, 19 Nov 2019 12:36:35 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:4daf39ed-81ca-452e-919b-5a8a2f0720d8</guid><dc:creator>bjorn-spockeli</dc:creator><description>&lt;p&gt;&lt;a href="https://devzone.nordicsemi.com/members/devsec"&gt;DevSec&lt;/a&gt;&amp;nbsp;See the&amp;nbsp;&lt;span class="item"&gt;&lt;a class="active" title="S140 SoftDevice" href="https://infocenter.nordicsemi.com/topic/struct_nrf52/struct/s140.html?cp=4_5_3"&gt;S140 SoftDevice&lt;/a&gt;&amp;nbsp;section on Infocenter for the SoftDevice Specification and the SoftDevice API reference.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="item"&gt;Best regards&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="item"&gt;Bj&amp;oslash;rn&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;div class="group"&gt;&lt;/div&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: KNOB Attack for BLE (nRF52840)</title><link>https://devzone.nordicsemi.com/thread/220836?ContentTypeID=1</link><pubDate>Tue, 19 Nov 2019 12:34:24 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:088b34e2-7406-49bb-adf5-11f726e42ac6</guid><dc:creator>DevSec</dc:creator><description>&lt;p&gt;Do we have API document which will explain the BLE stack architecture &amp;amp; API calls.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Regards,&lt;/p&gt;
&lt;p&gt;Yunus&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: KNOB Attack for BLE (nRF52840)</title><link>https://devzone.nordicsemi.com/thread/220831?ContentTypeID=1</link><pubDate>Tue, 19 Nov 2019 12:25:41 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:71c6ade0-d774-4c1a-a4b2-cead4a779a1a</guid><dc:creator>DevSec</dc:creator><description>&lt;p&gt;Thanks for clarification.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Regards,&lt;/p&gt;
&lt;p&gt;Yunus&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: KNOB Attack for BLE (nRF52840)</title><link>https://devzone.nordicsemi.com/thread/220827?ContentTypeID=1</link><pubDate>Tue, 19 Nov 2019 12:24:13 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:546e2e4a-6c22-4299-8a12-16a7605a2042</guid><dc:creator>bjorn-spockeli</dc:creator><description>&lt;p&gt;Yes, that is correct.&lt;/p&gt;
&lt;p&gt;Best regards&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Bjørn&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: KNOB Attack for BLE (nRF52840)</title><link>https://devzone.nordicsemi.com/thread/220815?ContentTypeID=1</link><pubDate>Tue, 19 Nov 2019 12:01:28 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:afa0c0b5-8e2e-47b1-b382-ef60a6771125</guid><dc:creator>DevSec</dc:creator><description>&lt;p&gt;Hi Bjorn,&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Thanks for quick reply.&lt;/p&gt;
&lt;p&gt;Did you mean that nRF52840 supports minimum key lengths &amp;gt;=7 bytes &amp;amp; maximum length is 16 bytes?&lt;/p&gt;
&lt;p&gt;Regards,&lt;/p&gt;
&lt;p&gt;Yunus&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: KNOB Attack for BLE (nRF52840)</title><link>https://devzone.nordicsemi.com/thread/220745?ContentTypeID=1</link><pubDate>Tue, 19 Nov 2019 09:04:20 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:bad9d352-e907-4738-bbe9-4dec19e3080e</guid><dc:creator>bjorn-spockeli</dc:creator><description>&lt;p&gt;-- Nordic devices and Software are not affected by the Bluetooth &amp;quot;KNOB&amp;quot; security vulnerability disclosed 14 August 2019 --&lt;/p&gt;
&lt;p&gt;The Bluetooth &amp;quot;KNOB&amp;quot;&amp;nbsp;security vulnerability in Bluetooth BR/EDR&amp;nbsp;was&amp;nbsp;published in&amp;nbsp;the following research paper,&amp;nbsp;&lt;a href="https://www.usenix.org/system/files/sec19-antonioli.pdf"&gt;https://www.usenix.org/system/files/sec19-antonioli.pdf&lt;/a&gt;,&amp;nbsp;&amp;nbsp;and the&amp;nbsp; Bluetooth SIG has released a corresponding notice on this attack, see&amp;nbsp;&lt;a href="https://www.bluetooth.com/security/statement-key-negotiation-of-bluetooth/"&gt;https://www.bluetooth.com/security/statement-key-negotiation-of-bluetooth/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;This issue only affects BR/EDR.&amp;nbsp; Bluetooth Low Energy&amp;nbsp;has minimum key lengths &amp;gt;=7 bytes enforced and BLE is not referred to in the paper or SIG notice at all.&lt;/p&gt;
&lt;p&gt;Our Bluetooth protocol stack team has confirmed this does not affect our products.&lt;/p&gt;
&lt;p&gt;Best regards&lt;/p&gt;
&lt;p&gt;Bjørn&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>