<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>LE Secure Connections Pairing Phase 2</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/88055/le-secure-connections-pairing-phase-2</link><description>Hi,Master: 
 In BT core_v5.0 2.3.5.6.3 Authentication Stage 1 – Passkey Entry, as shown in the figure below 
 Question: Why does the process loop 20 times, verifying one bit each time? 
 Assuming eavesdropping by capturing packets: 
 Loop 20 times Cai</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Fri, 20 May 2022 07:02:31 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/88055/le-secure-connections-pairing-phase-2" /><item><title>RE: LE Secure Connections Pairing Phase 2</title><link>https://devzone.nordicsemi.com/thread/368718?ContentTypeID=1</link><pubDate>Fri, 20 May 2022 07:02:31 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:c4876e47-75d7-443b-95ee-477188ed52ed</guid><dc:creator>outspace</dc:creator><description>&lt;p&gt;Thank you very much for your answer, although I am still a little unclear, but it does not affect my development work, thank you again&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: LE Secure Connections Pairing Phase 2</title><link>https://devzone.nordicsemi.com/thread/368629?ContentTypeID=1</link><pubDate>Thu, 19 May 2022 13:02:08 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:93f09932-8918-47cf-a4ec-aaab3604e6e6</guid><dc:creator>Kenneth</dc:creator><description>&lt;p&gt;I can find this have also been discussed in this thread:&amp;nbsp;&lt;br /&gt;&lt;a href="https://devzone.nordicsemi.com/f/nordic-q-a/82434/nrf52810-passkey-entry/342641#342641"&gt;https://devzone.nordicsemi.com/f/nordic-q-a/82434/nrf52810-passkey-entry/342641#342641&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Note that MITM attack breaks legacy pairing with any (even random) passkey from the first attempt. See &lt;a href="https://eprint.iacr.org/2013/309.pdf"&gt;eprint.iacr.org/.../309.pdf&lt;/a&gt; for the attack details.&lt;/p&gt;
&lt;p&gt;Best regards,&lt;br /&gt;Kenneth&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>