Cloning resistance in bluetooth

James A. Donald jamesd at
Sun Oct 26 04:42:23 EDT 2008

Suppose one has a system that automatically signs you on to anything if 
your cell phone is within bluetooth range of your computer, and 
automatically signs you off out of everything, and puts up a screen 
saver that will not go away, when your cell phone is out of range of 
your computer.

What is the basis for cloning resistance of a cell phone with blue tooth?

NFC provides physical authenticity - privacy on the model of whispering 
one's ear, and authentication by touching.  Is there any mechanism 
intended for mapping that to keys, so that when two NFC devices meet, 
they can give each other petnames, and subsequently recognize public 
keys by petname?

The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at

More information about the cryptography mailing list