Table 5 Summary of key properties and their security contributions.

From: Cellular automata based key distribution for lightweight hybrid image encryption with elliptic curve cryptography

Component

Role

Security Benefit

Private Key

Secret 256-bit integer (never shared).

Prevents MITM attacks.

Public Key is derived from a private key and is shared openly.

Enables secure ECDH.

Useless without a private key.

 

Shared Secret

Temporary key derived via ECDH.

Never transmitted.

Unique per session (forward secrecy).

CA Key

Final key from CA Rule vector (90,90,51,51,92,195,195,195) (32-byte).

Enhances randomness.

Resists statistical attacks.

AES-IV

Initialization Vector (128-bit).

Ensures identical plaintexts encrypt differently.