<section title="11.1. Bluetooth Communications"><subsection title="Objective"><paragraph
    title="11.1.1."


><![CDATA[<p>Bluetooth is used securely and Bluetooth communications are protected.</p>]]></paragraph>
 </subsection>
<subsection title="Context"><paragraph
    title="11.1.2."


><![CDATA[<p>Bluetooth radios are commonly found in end user devices, including laptops, mobile phones, and peripherals such as speakers, headphones, keyboards, and mice. More recently Bluetooth has been integrated into medical devices and personal devices.</p>]]></paragraph>
<paragraph
    title="11.1.3."


><![CDATA[<p>It is important to be aware of all risks associated with Bluetooth technology. The specific threats to Bluetooth communications, that the controls in this section address, relate to are:</p>
<ul>
<li>eavesdropping on the Bluetooth communications between paired devices, and&nbsp;</li>
<li>connection interception attacks that leverage the network communications channel (including during establishment) of Bluetooth devices.</li>
</ul>]]></paragraph>
 </subsection>
<subsection title="Background"><paragraph
    title="11.1.4."


><![CDATA[<p>The Bluetooth specification has evolved over time and is regularly updated. Version 4.0 of the specification introduced Bluetooth Low Energy (LE) which offers a different feature set than the original Bluetooth Basic Rate/Enhanced Data Rate (BR/EDR) standard. Version 4.1 and 4.2 of the specification introduced enhanced security features for Bluetooth BR/EDR and LE respectively.&nbsp;</p>]]></paragraph>
<paragraph
    title="11.1.5."


><![CDATA[<p>Determining the security level being provided depends on several factors, including the capabilities and Bluetooth version supported by the devices being paired together. The actual security provided between devices is a combination of:</p>
<p style="padding-left: 40px;">a. &nbsp; &nbsp; &nbsp;the version of the Bluetooth specification supported by each device,</p>
<p style="padding-left: 40px;">b. &nbsp; &nbsp; the capabilities of the devices to accept user input (eg, through a keyboard, or camera) and to display output (eg, through a screen or character display), and</p>
<p style="padding-left: 40px;">c. &nbsp; &nbsp; &nbsp;whether the devices are using Bluetooth BR/EDR or Bluetooth LE.</p>]]></paragraph>
<paragraph
    title="11.1.6."


><![CDATA[<p>The following table summarises the security protections expected based on the pairing Bluetooth device capabilities where devices are Bluetooth BR/EDR using Secure Connections (version 4.1 or later) or Bluetooth LE using Secure Connections (version 4.2 or later) – refer to NIST SP 800-121 REV.2 Guide to Bluetooth.</p>
<table style="border-collapse: collapse; width: 99.9659%; height: 128.8px; border-width: 1px;">
<tbody>
<tr style="height: 55.2px;">
<td class="text-center" style="width: 25.0773%; height: 55.2px; border-width: 1px;"><strong>Display or input capabilities of the devices</strong></td>
<td class="text-center" style="width: 24.5662%; height: 55.2px; border-width: 1px;"><strong>Association mode used</strong></td>
<td class="text-center" style="width: 25.759%; height: 55.2px; border-width: 1px;"><strong>Protected against connection interception</strong></td>
<td class="text-center" style="width: 24.7361%; height: 55.2px; border-width: 1px;"><strong>Protected against eavesdropping</strong></td>
</tr>
<tr style="height: 18.4px;">
<td class="text-center" style="width: 25.0773%; height: 18.4px; border-width: 1px;">Both devices can display and accept input</td>
<td class="text-center" style="width: 24.5662%; height: 18.4px; border-width: 1px;">Numeric Comparison</td>
<td class="text-center" style="width: 25.759%; height: 18.4px; border-width: 1px;">Yes</td>
<td class="text-center" style="width: 24.7361%; height: 18.4px; border-width: 1px;">Yes</td>
</tr>
<tr style="height: 18.4px;">
<td class="text-center" style="width: 25.0773%; height: 18.4px; border-width: 1px;">One device has input, one has display</td>
<td class="text-center" style="width: 24.5662%; height: 18.4px; border-width: 1px;">Passkey Entry</td>
<td class="text-center" style="width: 25.759%; height: 18.4px; border-width: 1px;">Yes</td>
<td class="text-center" style="width: 24.7361%; height: 18.4px; border-width: 1px;">Yes</td>
</tr>
<tr style="height: 18.4px;">
<td class="text-center" style="width: 25.0773%; height: 18.4px; border-width: 1px;">At least one device has no display or input</td>
<td class="text-center" style="width: 24.5662%; height: 18.4px; border-width: 1px;">Just Works</td>
<td class="text-center" style="width: 25.759%; height: 18.4px; border-width: 1px;">No</td>
<td class="text-center" style="width: 24.7361%; height: 18.4px; border-width: 1px;">Yes</td>
</tr>
<tr style="height: 18.4px;">
<td class="text-center" style="width: 25.0773%; height: 18.4px; border-width: 1px;">External channel for matching devices (eg, QR codes or NFC)</td>
<td class="text-center" style="width: 24.5662%; height: 18.4px; border-width: 1px;">Out of Band</td>
<td class="text-center" style="width: 25.759%; height: 18.4px; border-width: 1px;">Yes</td>
<td class="text-center" style="width: 24.7361%; height: 18.4px; border-width: 1px;">Yes</td>
</tr>
</tbody>
</table>]]></paragraph>
<paragraph
    title="11.1.7."


><![CDATA[<p>Particular care is required when associating Bluetooth devices using the Just Works association mode (eg, with headsets) due to the risk of the pairing connection being intercepted, and encryption keys being discovered.</p>]]></paragraph>
<paragraph
    title="11.1.8."


><![CDATA[<p>Since Bluetooth LE v4.2, released in 2014, versions of the Bluetooth protocol have included more advanced security features including authentication, authorisation, and encryption through the Secure Connections functionality. Encryption protocols are used to protect data from interception and authentication protocols ensure that only authorised devices can connect.</p>]]></paragraph>
<paragraph
    title="11.1.9."


><![CDATA[<p>The table below displays the key differences between Bluetooth Basic Rate/Enhanced Data Rate (BR/EDR) and Bluetooth Low Energy (LE).</p>
<table class="MsoTableGrid" style="border-collapse: collapse; border: none; mso-border-alt: solid windowtext .5pt; mso-yfti-tbllook: 1184; mso-padding-alt: 0cm 5.4pt 0cm 5.4pt;" cellspacing="0" cellpadding="0">
<tbody>
<tr style="mso-yfti-irow: 0; mso-yfti-firstrow: yes;">
<td style="width: 150.25pt; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; background: #0070C0; padding: 0cm 5.4pt 0cm 5.4pt;" rowspan="2" width="200" valign="top">
<p class="MsoNormal" style="text-align: center; line-height: normal; margin: 6.0pt 0cm 6.0pt 0cm;" align="center"><span style="color: white; mso-themecolor: background1;">Characteristic</span></p>
</td>
<td style="width: 150.25pt; border: solid windowtext 1.0pt; border-left: none; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; background: #0070C0; padding: 0cm 5.4pt 0cm 5.4pt;" colspan="2" width="214" valign="top">
<p class="MsoNormal" style="text-align: center; line-height: normal; margin: 6.0pt 0cm 6.0pt 0cm;" align="center"><span style="color: white; mso-themecolor: background1;">Bluetooth BR/EDR</span></p>
</td>
<td style="width: 150.3pt; border: solid windowtext 1.0pt; border-left: none; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; background: #0070C0; padding: 0cm 5.4pt 0cm 5.4pt;" colspan="2" width="200" valign="top">
<p class="MsoNormal" style="text-align: center; line-height: normal; margin: 6.0pt 0cm 6.0pt 0cm;" align="center"><span style="color: white; mso-themecolor: background1;">Bluetooth Low Energy</span></p>
</td>
</tr>
<tr style="mso-yfti-irow: 1;">
<td style="width: 75.1pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" width="114" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">Prior to 4.1</p>
</td>
<td style="width: 75.15pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" width="100" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">4.1 onwards</p>
</td>
<td style="width: 75.15pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" width="100" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">Prior to 4.2</p>
</td>
<td style="width: 75.15pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" width="100" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">4.2 onwards</p>
</td>
</tr>
<tr style="mso-yfti-irow: 2;">
<td style="width: 150.25pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" width="200" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">RF Physical Channels</p>
</td>
<td style="width: 150.25pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" colspan="2" width="214" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">79 channels with 1 MHz channel spacing</p>
</td>
<td style="width: 150.3pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" colspan="2" width="200" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">40 channels with 2 MHz channel spacing</p>
</td>
</tr>
<tr style="mso-yfti-irow: 3;">
<td style="width: 150.25pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" width="200" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">Discovery / Connect</p>
</td>
<td style="width: 150.25pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" colspan="2" width="214" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">Inquiry / Paging</p>
</td>
<td style="width: 150.3pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" colspan="2" width="200" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">Advertising</p>
</td>
</tr>
<tr style="mso-yfti-irow: 4;">
<td style="width: 150.25pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" width="200" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">Number of Piconet Slaves</p>
</td>
<td style="width: 150.25pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" colspan="2" width="214" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">7 (active) / 3255 (total)</p>
</td>
<td style="width: 150.3pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" colspan="2" width="200" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">Unlimited</p>
</td>
</tr>
<tr style="mso-yfti-irow: 5;">
<td style="width: 150.25pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" width="200" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">Device Address Privacy</p>
</td>
<td style="width: 150.25pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" colspan="2" width="214" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">None</p>
</td>
<td style="width: 150.3pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" colspan="2" width="200" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">Private device addressing available</p>
</td>
</tr>
<tr style="mso-yfti-irow: 6;">
<td style="width: 150.25pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" width="200" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">Max Data Rate</p>
</td>
<td style="width: 150.25pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" colspan="2" width="214" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">1-3 Mbps</p>
</td>
<td style="width: 150.3pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" colspan="2" width="200" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">1 Mbps via GFSK modulation</p>
</td>
</tr>
<tr style="mso-yfti-irow: 7; height: 6.75pt;">
<td style="width: 150.25pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; height: 6.75pt;" rowspan="2" width="200" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">Pairing Algorithm</p>
</td>
<td style="width: 75.1pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; height: 6.75pt;" width="114" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">Prior to 2.1:</p>
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">E21/E22/SAFER+</p>
</td>
<td style="width: 75.15pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; height: 6.75pt;" rowspan="2" width="100" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">P-256 Elliptic Curve, HMAC-SHA-256</p>
</td>
<td style="width: 75.15pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; height: 6.75pt;" rowspan="2" width="100" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">AES-128</p>
</td>
<td style="width: 75.15pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; height: 6.75pt;" rowspan="2" width="100" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">P-256 Elliptic Curve, AES-CMAC</p>
</td>
</tr>
<tr style="mso-yfti-irow: 8; height: 6.75pt;">
<td style="width: 75.1pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt; height: 6.75pt;" width="114" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">2.1-4.0:P-192</p>
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">Elliptic Curve<sup>9</sup></p>
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">HMAC-SHA-256</p>
</td>
</tr>
<tr style="mso-yfti-irow: 9;">
<td style="width: 150.25pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" width="200" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">Device Authentication Algorithm</p>
</td>
<td style="width: 75.1pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" width="114" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">E1/SAFER</p>
</td>
<td style="width: 75.15pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" width="100" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">HMAC-SHA-256</p>
</td>
<td style="width: 150.3pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" colspan="2" width="200" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">AES-CCM<sup>10</sup></p>
</td>
</tr>
<tr style="mso-yfti-irow: 10;">
<td style="width: 150.25pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" width="200" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">Encryption Algorithm</p>
</td>
<td style="width: 75.1pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" width="114" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">E0/SAFER+</p>
</td>
<td style="width: 75.15pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" width="100" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">AES-CCM</p>
</td>
<td style="width: 150.3pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" colspan="2" width="200" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">AES-CCM</p>
</td>
</tr>
<tr style="mso-yfti-irow: 11;">
<td style="width: 150.25pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" width="200" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">Typical Range</p>
</td>
<td style="width: 150.25pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" colspan="2" width="214" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">30m</p>
</td>
<td style="width: 150.3pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" colspan="2" width="200" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">50m</p>
</td>
</tr>
<tr style="mso-yfti-irow: 12; mso-yfti-lastrow: yes;">
<td style="width: 150.25pt; border: solid windowtext 1.0pt; border-top: none; mso-border-top-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" width="200" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">Max Output Power</p>
</td>
<td style="width: 150.25pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" colspan="2" width="214" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">100mW (20 dBm)</p>
</td>
<td style="width: 150.3pt; border-top: none; border-left: none; border-bottom: solid windowtext 1.0pt; border-right: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt 0cm 5.4pt;" colspan="2" width="200" valign="top">
<p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center">10mW (10 dBm)<sup>11</sup></p>
</td>
</tr>
</tbody>
</table>
<p class="MsoNormal text-right">Reference: NIST SP 800-121 REV.2 Guide to Bluetooth Table2-2</p>
<p class="MsoNormal">&nbsp;</p>]]></paragraph>
<paragraph
    title="11.1.10."


><![CDATA[<p>5.x Bluetooth versions have introduced faster data transfers, larger data capacity, greater range and optimised power consumption.</p>]]></paragraph>
 </subsection>
<subsection title="Threats"> <block title="General wireless networking threats"><paragraph
    title="11.1.11."


><![CDATA[<p>Bluetooth is susceptible to general wireless networking threats such as:</p>
<ul>
<li><strong>denial-of-service (DoS) attacks:</strong> is a malicious attempt to overwhelm an online service or network and render it unusable</li>
<li><strong>eavesdropping;</strong> occurs when a hacker intercepts, deletes, or modifies data that is transmitted between two devices.</li>
<li><strong>adversary in the middle attacks:</strong> a threat actor puts themselves in the middle of two parties to intercept data &amp; use it for malicious purposes</li>
<li><strong>message modification:</strong> an intruder alters packet header addresses to direct a message to a different destination or to modify the data on a target machine.&nbsp;</li>
<li><strong>resource misappropriation:</strong> is an attack in which the attacker steals or makes unauthorised use of a service.</li>
</ul>]]></paragraph>
</block>
<block title="Bluetooth specific threats"><paragraph
    title="11.1.12."


><![CDATA[<p><strong>Connection Interception Attacks</strong></p>
<p>Bluetooth connections can be intercepted by a hacker who poses as a legitimate device to gain access to sensitive information.&nbsp;</p>
<ul>
<li><strong>Bluesnarfing:</strong> &nbsp;is a hacking technique in which a hacker accesses a wireless device through a Bluetooth connection. It happens without the device user's permission and often results in the theft of information or some other kind of damage to the device (and user).</li>
<li><strong>Bluebugging:</strong> is a hacking technique that lets someone get into your device through your discoverable Bluetooth connection.</li>
<li><strong>Bluejacking: </strong>is a Bluetooth attack in which a hacker spams your device with unsolicited phishing messages.</li>
<li><strong>Car Whisperer:</strong> &nbsp;is a hacking technique that can be used by attackers to hack a hands-free Bluetooth in-car system.</li>
<li><strong>Fuzzing Attacks:</strong> consist of sending malformed or otherwise non-standard data to a device's Bluetooth radio and observing how the device reacts.</li>
</ul>]]></paragraph>
<paragraph
    title="11.1.13."


><![CDATA[<p><strong>Eavesdropping attacks</strong></p>
<p>When eavesdropping takes place on the Bluetooth communications between paired devices</p>
<ul>
<li><strong>Pairing Eavesdropping:</strong> is an attack where Bluetooth devices are forced to re-pair in the open and this allow the pairing process to be eavesdropped.</li>
<li><strong>Secure Simple Pairing Attacks:</strong> During the Bluetooth pairing process, an attacker with physical proximity can gain unauthorised access via an adjacent network, and intercept traffic and send forged pairing messages between two vulnerable Bluetooth devices.</li>
</ul>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="11.1.14."


><![CDATA[<p>References are available at the following source:</p>
<table class="table-main" style="width: 99.9659%; height: 105.6px;">
<tbody>
<tr style="height: 18.4px;">
<td style="width: 42.9887%;"><strong>Reference</strong></td>
<td style="text-align: center; width: 15.1825%;"><strong>Publisher</strong></td>
<td style="width: 41.7946%;"><strong>Title</strong></td>
</tr>
<tr style="height: 87.2px;">
<td style="width: 42.9887%;">
<p class="MsoNormal" style="margin-bottom: 9.0pt; line-height: normal;"><span style="mso-fareast-font-family: &#039;Times New Roman&#039;; color: #212529; mso-fareast-language: EN-NZ;">NIST 800-121, Rev.2, May 2017<span style="mso-bidi-font-weight: bold;"> </span></span></p>
<p><strong><span style="font-size: 10.0pt; line-height: 107%; font-family: &#039;Calibri&#039;,sans-serif; mso-fareast-font-family: Calibri; mso-ansi-language: EN-NZ; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;">(INCLUDES UPDATES AS OF 1-19-2022)</span><span style="font-size: 10.0pt; line-height: 107%; font-family: &#039;Calibri&#039;,sans-serif; mso-ascii-theme-font: minor-latin; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: Arial; mso-bidi-theme-font: minor-bidi; color: #212529; mso-ansi-language: EN-NZ; mso-fareast-language: EN-NZ; mso-bidi-language: AR-SA;"> </span></strong></p>
</td>
<td style="text-align: center; width: 15.1825%;">NIST</td>
<td style="width: 41.7946%;"><span style="font-size: 11.0pt; line-height: 107%; font-family: &#039;Calibri&#039;,sans-serif; mso-ascii-theme-font: minor-latin; mso-fareast-font-family: Calibri; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: Arial; mso-bidi-theme-font: minor-bidi; mso-ansi-language: EN-NZ; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;"><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-121r2-upd1.pdf"><span style="mso-ascii-font-family: Calibri; mso-fareast-font-family: Calibri; mso-hansi-font-family: Calibri; mso-bidi-font-family: Calibri;">Guide to Bluetooth Security (nist.gov)</span></a></span></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Bluetooth within agency environments"><paragraph
    title="11.1.15.R.01."


><![CDATA[<p>Bluetooth provides a convenient method of wirelessly connecting devices and includes support for a wide variety of usage scenarios.&nbsp;</p>]]></paragraph>
<paragraph
    title="11.1.15.R.02."


><![CDATA[<p>Bluetooth is commonly found in low powered consumer devices, medical devices, and peripherals. Bluetooth operates in the same 2.4GHz wireless band as other non-licenced spectrum services such as Wi-Fi.</p>]]></paragraph>
<paragraph
    title="11.1.15.R.03."


><![CDATA[<p>Bluetooth is generally suitable for connectivity between devices in lower classification settings, and where adequate consideration is given to the purpose of the connection, the type of information being transmitted, the security capabilities of the devices, and the environment the devices are operating in.&nbsp;&nbsp;</p>]]></paragraph>
<paragraph
    title="11.1.15.R.04."


><![CDATA[<p>Given the large number of potential situations Bluetooth could be used in, it is essential that agencies develop a considered position on where and where not to permit the use of Bluetooth connections.</p>]]></paragraph>
<paragraph
    title="11.1.15.C.01."

    tags="Bluetooth,Communications systems,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="7524"
><![CDATA[<p>Agencies wishing to permit the use of Bluetooth MUST develop a policy that details the circumstances under which Bluetooth usage is permitted, and situations where it is not to be used.</p>]]></paragraph>
<paragraph
    title="11.1.15.C.02."

    tags="Bluetooth,Communications systems,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="7525"
><![CDATA[<p>The policy position MUST include information about Bluetooth security controls that are to be used, and methods for verifying that the controls are in place and are effective.</p>]]></paragraph>
</block>
<block title="Bluetooth connections"><paragraph
    title="11.1.16.R.01."


><![CDATA[<p>Bluetooth connections between devices of different security protocol levels will result in a degradation of the security level.</p>]]></paragraph>
<paragraph
    title="11.1.16.R.02."


><![CDATA[<p>Bluetooth connections between devices that can revert to weaker protocol options, and that do not support effective security features will increase risk of compromise.</p>]]></paragraph>
<paragraph
    title="11.1.16.C.01."

    tags="Bluetooth,Communications systems,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="7526"
><![CDATA[<p>Agencies MUST ensure that Bluetooth pairing is only established between authorised devices. (Unless a gateway is being used, paired devices are considered to operate at the same security classification level).</p>]]></paragraph>
<paragraph
    title="11.1.16.C.02."

    tags="Bluetooth,Communications systems,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="7527"
><![CDATA[<p>Agencies SHOULD ensure that Bluetooth discovery of devices is disabled unless a new pairing connection is being established.</p>]]></paragraph>
<paragraph
    title="11.1.16.C.03."

    tags="Bluetooth,Communications systems,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="7528"
><![CDATA[<p>Agencies SHOULD ensure that Bluetooth device pairing only occurs at a location where only authorised persons have access.</p>]]></paragraph>
<paragraph
    title="11.1.16.C.04."

    tags="Bluetooth,Communications systems,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="7529"
><![CDATA[<p>Agencies SHOULD ensure that Bluetooth pairings are removed when they are no longer required.</p>]]></paragraph>
</block>
<block title="Bluetooth versions"><paragraph
    title="11.1.17.R.01."


><![CDATA[<p>It is difficult to determine what Bluetooth security features are being used for a connection between devices without capturing and decoding the connection establishment packets.&nbsp;</p>
<p>Since Bluetooth LE v4.2, versions of the Bluetooth protocol have included more advanced security features including authentication, authorisation, and encryption through the Secure Connections functionality.</p>]]></paragraph>
<paragraph
    title="11.1.17.R.02."


><![CDATA[<p>Ensuring some end-user visible features are being used during the device pairing process can provide a level of understanding of the security between Bluetooth connected devices.</p>]]></paragraph>
<paragraph
    title="11.1.17.C.01."

    tags="Bluetooth,Communications systems,Technical"


    classification="All Classifications"
    compliance="Must"
    cid="7530"
><![CDATA[<p>Agencies using Bluetooth MUST use the most secure configuration supported by the paired devices.</p>]]></paragraph>
<paragraph
    title="11.1.17.C.02."

    tags="Bluetooth,Communications systems,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="7531"
><![CDATA[<p>Agencies SHOULD identify the:</p>
<ul>
<li>Bluetooth type (BR/EDR or LE),&nbsp;</li>
<li>version, and</li>
<li>security capabilities;</li>
</ul>
<p>for devices used to form Bluetooth connections, and ensure they are used to inform risk decisions on the use of Bluetooth.</p>]]></paragraph>
<paragraph
    title="11.1.17.C.03."

    tags="Bluetooth,Communications systems,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="7532"
><![CDATA[<p>Agencies SHOULD ensure that new Bluetooth connections between devices are authenticated using explicit user actions, such as entry of a numeric code, confirmation of a matching PIN, or other affirming action, such as challenge-response process.</p>]]></paragraph>
</block>
<block title="Encryption and authentication protocols"><paragraph
    title="11.1.18.R.01."


><![CDATA[<p>When transferring information between Bluetooth devices, encryption protocols are used to protect data from interception and authentication protocols ensure that only authorised devices can connect.</p>]]></paragraph>
<paragraph
    title="11.1.18.R.02."


><![CDATA[<p>Chapter 17 of the NZISM provides approved encryption algorithms. Even in the most secure operating model, Bluetooth specifications are currently unable to support these approved encryption methods. Whilst Bluetooth cannot meet these requirements, there may be organisational requirements to use Bluetooth to transfer Restricted or Sensitive information between devices.</p>]]></paragraph>
<paragraph
    title="11.1.18.C.01."

    tags="Bluetooth,Communications systems,Technical"


    classification="Unclassified/In-Confidence"
    compliance="Should"
    cid="7533"
><![CDATA[<p>Agencies using Bluetooth between devices to transfer UNCLASSIFIED or IN-CONFIDENCE information SHOULD ensure that connections meet NZISM standards for authentication and use Approved Cryptographic Algorithms for encryption and message integrity.&nbsp;</p>]]></paragraph>
<paragraph
    title="11.1.18.C.02."

    tags="Bluetooth,Communications systems,Technical"


    classification="Restricted/Sensitive"
    compliance="Must"
    cid="7534"
><![CDATA[<p>Agencies using Bluetooth between devices to transfer RESTRICTED or SENSITIVE information MUST ensure that connections meet NZISM standards for authentication and use Approved Cryptographic Algorithms for encryption and message integrity.</p>]]></paragraph>
<paragraph
    title="11.1.18.C.03."

    tags="Bluetooth,Communications systems,Technical"


    classification="Restricted/Sensitive"
    compliance="Must"
    cid="7535"
><![CDATA[<p>If Bluetooth specifications do not support these approved encryption methods, organisations MUST do a risk assessment and use the exception or waiver process to accept this risk.</p>]]></paragraph>
</block>
<block title="Bluetooth in secure areas"><paragraph
    title="11.1.19.R.01."


><![CDATA[<p>As with other wireless protocols, the level of security offered by Bluetooth can vary widely depending on the capabilities of the devices being connected.&nbsp;</p>]]></paragraph>
<paragraph
    title="11.1.19.R.02."


><![CDATA[<p>Bluetooth devices will revert to older, less secure versions of the protocol to maintain compatibility, so careful consideration needs to be undertaken before approving the use of the Bluetooth protocol.</p>]]></paragraph>
<paragraph
    title="11.1.19.C.01."

    tags="Bluetooth,Communications systems,Technical,RF Devices"


    classification="Confidential, Top Secret, Secret"
    compliance="Must"
    cid="2492"
><![CDATA[<p>Agencies MUST complete a technical evaluation of the secure area, consult the relevant technical authority and seek approval from the Accreditation Authority before permitting the use of Bluetooth devices.</p>]]></paragraph>
<paragraph
    title="11.1.19.C.02."

    tags="Bluetooth,Communications systems,Technical,RF Devices"


    classification="Confidential, Top Secret, Secret"
    compliance="Must Not"
    cid="2494"
><![CDATA[<p>Agencies using Bluetooth devices MUST NOT allow:</p>
<ul>
<li>line of sight and reflected communications travelling into an unsecure area.</li>
<li>multiple Bluetooth devices at different classifications in the same area.</li>
</ul>]]></paragraph>
<paragraph
    title="11.1.19.C.03."

    tags="Bluetooth,Communications systems,Technical,RF Devices"


    classification="Top Secret, Confidential, Secret"
    compliance="Must Not"
    cid="2495"
><![CDATA[<p>Agencies MUST NOT allow Bluetooth devices into secure areas unless authorised by the Accreditation Authority.</p>]]></paragraph>
</block>
</subsection>
</section>
