Beware that this post is related to an SDK in maintenance mode
More Info: Consider nRF Connect SDK for new designs
This post is older than 2 years and might not be relevant anymore
More Info: Consider searching for newer posts

Bluetooth LESC question

Hi, I want to secure connection between our device (nRF52840 or nRF51822) and a smartphone.

I find that LESC uses ECDH which is more secure than RSA in same key length.

I want to apply lesc to our device. but, I have confused a few things.

The LESC should have I/O capabilities or OOB.

1) Why LESC should have I/O capabilities or OOB?

> I guess a scenario of secure connection.
(1) each device generate key pair of ECDH (2) exchange public key (3) calculate shared secret (4) finally secure connection channel has create

--> I think human interface or another channel does not necessary in this scenario.
> Why human interface (I/O capabilities) should be necessary?
> Why another channel (OOB) should be necessary?

2) It is basic, Is the word "bluetooth connection" equivalent to "bluetooth pairing"?

3) What differences has bluetooth pairing and bonding?

Parents
  • Hi,

    1) Why LESC should have I/O capabilities or OOB?

    There are three ways to protect a link against Man-in-the-middle attack:

    - OOB channel that cannot be eavesdropped

    - human interface (user can ensure that keys are the same at both sides)

    - device key signed with ECDSA (ensuring strong readout protection of private key achievable only using external Secure Element chip).

    In LESC, first two methods are used. Of course, you can set up LESC in "just works" mode, but security level will be the same as with legacy pairing.

    2) It is basic, Is the word "bluetooth connection" equivalent to "bluetooth pairing"?
    3) What differences has bluetooth pairing and bonding?

    See this answer.

Reply
  • Hi,

    1) Why LESC should have I/O capabilities or OOB?

    There are three ways to protect a link against Man-in-the-middle attack:

    - OOB channel that cannot be eavesdropped

    - human interface (user can ensure that keys are the same at both sides)

    - device key signed with ECDSA (ensuring strong readout protection of private key achievable only using external Secure Element chip).

    In LESC, first two methods are used. Of course, you can set up LESC in "just works" mode, but security level will be the same as with legacy pairing.

    2) It is basic, Is the word "bluetooth connection" equivalent to "bluetooth pairing"?
    3) What differences has bluetooth pairing and bonding?

    See this answer.

Children
No Data
Related