This blog is describe how the bonding / pair works on the Bluetooth Low Energy.

In the Bluetooth Core Specification, there are three major architectural layers: Controller, Host and Application. Security Manager (SM) at the Host layer is to define the methods and protocols for pairing and key distribution, the corresponding security toolbox and Security Manager Protocol (SMP).

This image has an empty alt attribute; its file name is image-11.png

Pairing is performed to establish keys which can then be used to encrypt a link. A transport specific key distribution is then performed to share the keys. The keys can be used to encrypt a link in future reconnections, verify signed data, or perform random address resolution. In general, there are 3-phase for paring.

  • Phase 1: Pairing Feature Exchange
  • Phase 2 (LE legacy pairing): Short Term Key (STK) Generation
  • Phase 2 (LE Secure Connections): Long Term Key (LTK) Generation
  • Phase 3: Transport Specific Key Distribution

There are two difference pairings on the bluetooth specification.

  1. LE Legacy pairing
  2. LE Secure Connections (ready on the Bluetooth 4.2 specification)

There are five very good documents from the Bluetooth SIG Blog on the bonding / pair.

Pairing Feature Exchangehttps://www.bluetooth.com/blog/bluetooth-pairing-part-1-pairing-feature-exchange/

Key Generation Methodshttps://www.bluetooth.com/blog/bluetooth-pairing-part-2-key-generation-methods/

Legacy Pairing Passkey Entryhttps://www.bluetooth.com/blog/bluetooth-pairing-passkey-entry/

LE Secure Connections – Numeric Comparisonhttps://www.bluetooth.com/blog/bluetooth-pairing-part-4/

Legacy Pairing – Out of Bandhttps://www.bluetooth.com/blog/bluetooth-pairing-part-5-legacy-pairing-out-of-band/