Doubts about Bluetooth Secure Authentication
I’m reading "Guide to Bluetooth Security" by NIST (available here). At page 22 (page 33 of the PDF), they describe the Secure Authentication scheme. From what I can understand, both the devices compute the same value, then they s…