CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Hybrid Encryption Technique to Secure Bluetooth Communication

Published on Decmber 2011 by P S Patheja, Akhilesh A. Waoo, Sudhir Nagwanshi
International Conference on Computer Communication and Networks CSI-COMNET-2011
Foundation of Computer Science USA
COMNET - Number 1
Decmber 2011
Authors: P S Patheja, Akhilesh A. Waoo, Sudhir Nagwanshi
e24a54a7-800e-494e-bb61-58577f9473ee

P S Patheja, Akhilesh A. Waoo, Sudhir Nagwanshi . A Hybrid Encryption Technique to Secure Bluetooth Communication. International Conference on Computer Communication and Networks CSI-COMNET-2011. COMNET, 1 (Decmber 2011), 26-32.

@article{
author = { P S Patheja, Akhilesh A. Waoo, Sudhir Nagwanshi },
title = { A Hybrid Encryption Technique to Secure Bluetooth Communication },
journal = { International Conference on Computer Communication and Networks CSI-COMNET-2011 },
issue_date = { Decmber 2011 },
volume = { COMNET },
number = { 1 },
month = { Decmber },
year = { 2011 },
issn = 0975-8887,
pages = { 26-32 },
numpages = 7,
url = { /proceedings/comnet/number1/5418-1006/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Computer Communication and Networks CSI-COMNET-2011
%A P S Patheja
%A Akhilesh A. Waoo
%A Sudhir Nagwanshi
%T A Hybrid Encryption Technique to Secure Bluetooth Communication
%J International Conference on Computer Communication and Networks CSI-COMNET-2011
%@ 0975-8887
%V COMNET
%N 1
%P 26-32
%D 2011
%I International Journal of Computer Applications
Abstract

A proprietary open wireless technology standard for exchanging data over short distances from one device to another is not much secure. As in traditional method of Bluetooth communication between two or more devices a 128-bit symmetric stream cipher called E0 is used which seems to be week under some conditions it may be broken under certain conditions with the time complexity O (264). To improve security of data we propose a hybrid encryption technique. In this technique we use triple DES for encryption of the key for which we use Tiger algorithm. In Tiger algorithm there is double protection of Data using triple DES and with the help of this algorithm transmission of data will be more secure for exchanging data over short distances from one device to another

References
  1. A Hybrid Encryption Algorithm Based on DES and RSA in Bluetooth Communication, Wuling Ren, Zhiqian Miao, College of Computer and Information Engineering Zhejiang Gongshang University
  2. Performance Analysis of SAFER+ and Triple DES security algorithms for Bluetooth Security Systems , Dr.R.Neelaveni,D.Sharmila
  3. Bluetooth Hacking: A Case Study, Dennis Browning, Gary C. Kessler
  4. Zheng Hu. Network and Information Security [M]. Peking: Tsinghua University Pres, 2006.
  5. Man Young Rhee. Network Security Encryption Principle, algorithm and Protocol[M]. Peking: Tsinghua University Pres, 2007.
  6. Suri, P. R.; Rani, S. Bluetooth security Need to increase the efficiency in pairing [J]. IEEE/ Southeastcon, 2008.
  7. Fengying Wang. Dynamic Key 3DES Algorithm of Discrete System Based on Multi-dimension Chaos [J]. Microelectronics and Computer, 2005, 7: 25-28.
  8. Falk A. The IETF, the IRTF and the networking research Community.Computer Communication Review, v35, n5, Oct. 2005:6970.
  9. Yaniv Shaked, Avishai Wool. Cracking t he Bluetooth P[C]. 3rd USEN IX/ ACM Conf. Mobile Systems, Application and Services (MobiSys). Seattle, WA, June 2005:39250.
  10. Data Encryption using DES/Triple-DES Functionality in Spartan-II FPGAs, Amit Dhir
  11. Cryptanalysis of Bluetooth Keystream Generator Two-level E0, Yi Lu? and Serge Vaudenay
  12. On the Existence of low-degree Equations for Algebraic Attacks, Frederik Armknecht?
  13. Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher Revised 19 May 2008 William C. Barker
  14. Tiger: A Fast New Hash Function, Ross Anderson, Eli Biham
  15. Serpent: A New Block Cipher Proposal, Eli Biham, Ross Anderson and Lars Knudsen
  16. Cracking the Bluetooth PIN, Yaniv Shaked and Avishai Wool.
Index Terms

Computer Science
Information Sciences

Keywords

Bluetooth E0 key stream hybrid encryption algorithm data transmission