<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Custom Application Level Encryption Examples</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/65672/custom-application-level-encryption-examples</link><description>Does Nordic have an examples for implementing symmetric encryption at the BLE application level? I&amp;#39;m trying to understand how best to start because the Bluetooth LE security isn&amp;#39;t an option for us since our device doesn&amp;#39;t have a keyboard or screen and</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Tue, 08 Sep 2020 14:23:38 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/65672/custom-application-level-encryption-examples" /><item><title>RE: Custom Application Level Encryption Examples</title><link>https://devzone.nordicsemi.com/thread/268571?ContentTypeID=1</link><pubDate>Tue, 08 Sep 2020 14:23:38 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:7af60f5a-a229-4f20-84ca-c379fb15151c</guid><dc:creator>ovrebekk</dc:creator><description>&lt;p&gt;Hi Darren&lt;/p&gt;
&lt;p&gt;I made a simple example a way back showing how to do simple AES encryption over a proprietary link, but I would&amp;nbsp;strongly discourage going this route.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;You don&amp;#39;t need a keyboard or screen to do encryption with BLE, it just means you won&amp;#39;t be able to authenticate the pairing procedure (leaving you vulnerable to man in the middle attacks).&lt;/p&gt;
&lt;p&gt;Once the pairing is done you will be encrypted, and no longer vulnerable (unless someone can force your device to pair again),&amp;nbsp;&lt;/p&gt;
&lt;p&gt;If you can somehow provide some&amp;nbsp;out of band data on each side you can still authenticate without a keyboard and screen available, but you need some way to provide this data securely to both devices.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Pairing with BLE is quite flexible, and I don&amp;#39;t really see what you would gain by doing this yourself, other than add a lot of work to design and test your own algorithms, as well as added memory and CPU requirements because you are unable to leverage the stack encryption (the encryption hardware in the nRF52 series is designed with the Bluetooth stack in mind after all).&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Best regards&lt;br /&gt;Torbjørn&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>