<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Bluetooth LESC question</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/66122/bluetooth-lesc-question</link><description>Hi, I want to secure connection between our device (nRF52840 or nRF51822) and a smartphone. 
 I find that LESC uses ECDH which is more secure than RSA in same key length. 
 I want to apply lesc to our device. but, I have confused a few things. 
 The LESC</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Mon, 21 Sep 2020 06:42:00 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/66122/bluetooth-lesc-question" /><item><title>RE: Bluetooth LESC question</title><link>https://devzone.nordicsemi.com/thread/270453?ContentTypeID=1</link><pubDate>Mon, 21 Sep 2020 06:42:00 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:39a4f88d-191b-44cf-a01a-e55eb05bc611</guid><dc:creator>Karl Ylvisaker</dc:creator><description>&lt;p&gt;Hello,&lt;br /&gt;&lt;br /&gt;In addition to Dmitry&amp;#39;s reply I highly recommend reading &lt;a href="https://devzone.nordicsemi.com/f/nordic-q-a/35856/questions-about-lesc-mitm-and-passkey/138216#138216"&gt;Emil&amp;#39;s reply in this ticket&lt;/a&gt;&amp;nbsp;for a more detailed explanation of both LESC, and how it is different from Legacy pairing.&lt;br /&gt;&lt;br /&gt;Best regards,&lt;br /&gt;Karl&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Bluetooth LESC question</title><link>https://devzone.nordicsemi.com/thread/270405?ContentTypeID=1</link><pubDate>Sat, 19 Sep 2020 09:24:07 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:ef1ae05a-448b-4ec4-a392-7fac827956fc</guid><dc:creator>Dmitry</dc:creator><description>&lt;p&gt;Hi,&lt;/p&gt;
[quote userid="72896" url="~/f/nordic-q-a/66122/bluetooth-lesc-question"]1) Why LESC should have I/O &lt;span&gt;capabilities&amp;nbsp;&lt;/span&gt;or OOB?[/quote]
&lt;p&gt;There are three ways to protect a link against&amp;nbsp;&lt;a href="https://en.wikipedia.org/wiki/Man-in-the-middle_attack"&gt;Man-in-the-middle attack&lt;/a&gt;:&lt;/p&gt;
&lt;p&gt;- OOB channel that cannot be eavesdropped&lt;/p&gt;
&lt;p&gt;- human interface (user can ensure that keys are the same at both sides)&lt;/p&gt;
&lt;p&gt;- device key signed with ECDSA (ensuring strong readout protection of private key achievable only using external Secure Element chip).&lt;/p&gt;
&lt;p&gt;In LESC, first two methods are used. Of course, you can set up LESC in &amp;quot;just works&amp;quot; mode, but security level will be the same as with legacy pairing.&lt;/p&gt;
[quote userid="72896" url="~/f/nordic-q-a/66122/bluetooth-lesc-question"]2) It is basic, Is the word &amp;quot;bluetooth connection&amp;quot; equivalent to &amp;quot;bluetooth pairing&amp;quot;?[/quote][quote userid="72896" url="~/f/nordic-q-a/66122/bluetooth-lesc-question"]3) What differences has bluetooth pairing and bonding?[/quote]
&lt;p&gt;See&amp;nbsp;&lt;a href="https://devzone.nordicsemi.com/f/nordic-q-a/11939/connecting-bonding-pairing-and-whitelists"&gt;this&lt;/a&gt;&amp;nbsp;answer.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>