Table 5 Summary of key properties and their security contributions.
Component | Role | Security Benefit |
|---|---|---|
Private Key | Secret 256-bit integer (never shared). | Prevents MITM attacks. |
Public Key is derived from a private key and is shared openly. | Enables secure ECDH. Useless without a private key. | |
Shared Secret | Temporary key derived via ECDH. | Never transmitted. Unique per session (forward secrecy). |
CA Key | Final key from CA Rule vector (90,90,51,51,92,195,195,195) (32-byte). | Enhances randomness. Resists statistical attacks. |
AES-IV | Initialization Vector (128-bit). | Ensures identical plaintexts encrypt differently. |