Table 6 Example key exchange scenario using ECDH and CA-based key derivation.
Party | Action | Keys Involved | Outcome |
---|---|---|---|
Alice | Generates (PrivateKeyA, PublicKeyA) | PrivateKeyA (secret) | Ready for exchange |
Bob | Generates (PrivateKeyB, PublicKeyB) | PrivateKeyB (secret) | Ready for exchange |
Alice \(\rightarrow\) Bob | Sends PublicKeyA to Bob | PublicKeyA (shared) | Bob receives Alice’s key |
Bob \(\rightarrow\) Alice | Sends PublicKeyB to Alice | PublicKeyB (shared) | Alice receives Bob’s key |
Alice | Computes SharedSecret = PrivateKeyA \(\times\) PublicKeyB | PrivateKeyA + PublicKeyB | Gets shared secret |
Bob | Computes SharedSecret = PrivateKeyB \(\times\) PublicKeyA | PrivateKeyB + PublicKeyA | Gets same shared secret |
Both | Generate CA_Key from shared secret | CA_Key (derived) | Ready for AES encryption |