Table 4 Key-sharing process in proposed work (ECC + CA Rule 90).

From: Cellular automata based key distribution for lightweight hybrid image encryption with elliptic curve cryptography

Step

Action

Who Does It?

Key Type Used

Purpose

1. Key Generation

Generate ECC key pairs (PrivateKey, PublicKey) using the secp256r1 curve.

Both parties (Alice & Bob)

Private Key (secret), Public Key (shared)

Establish secure identities for key exchange.

2. Key Exchange

Exchange public keys while keeping private keys secret.

Alice \(\rightarrow\) Bob, Bob \(\rightarrow\) Alice

Public Key

Enable secure shared secret computation.

3. Shared Secret

Compute shared secret via ECDH: Alice: PrivateKey_A * PublicKey_B, Bob: PrivateKey_B * PublicKey_A

Both parties

Private Key + Peer’s Public Key

Derive identical secret without transmitting it.

4. CA Key Creation

Convert shared secret to integer, feed into CA Rule 90, and generate CA_Key.

Both parties

Shared Secret (from ECDH)

Add chaos-based randomness for stronger encryption.

5. AES Encryption

Use CA_Key to initialize AES-128 (with IV) for image encryption/decryption.

Encryptor / Decryptor

CA_Key (derived)

Secure image data with lightweight encryption.