[136282] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Cloning resistance in bluetooth

daemon@ATHENA.MIT.EDU (James A. Donald)
Mon Oct 27 16:54:05 2008

Date: Sun, 26 Oct 2008 18:42:23 +1000
From: "James A. Donald" <jamesd@echeque.com>
To: Cryptography <cryptography@metzdowd.com>
In-Reply-To: <ed843b100809120855r6cd81efawb4d09f19f358f7cd@mail.gmail.com>

Suppose one has a system that automatically signs you on to anything if 
your cell phone is within bluetooth range of your computer, and 
automatically signs you off out of everything, and puts up a screen 
saver that will not go away, when your cell phone is out of range of 
your computer.

What is the basis for cloning resistance of a cell phone with blue tooth?

NFC provides physical authenticity - privacy on the model of whispering 
one's ear, and authentication by touching.  Is there any mechanism 
intended for mapping that to keys, so that when two NFC devices meet, 
they can give each other petnames, and subsequently recognize public 
keys by petname?

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post