Table 6 Example key exchange scenario using ECDH and CA-based key derivation.

From: Cellular automata based key distribution for lightweight hybrid image encryption with elliptic curve cryptography

Party

Action

Keys Involved

Outcome

Alice

Generates (PrivateKeyA, PublicKeyA)

PrivateKeyA (secret)

Ready for exchange

Bob

Generates (PrivateKeyB, PublicKeyB)

PrivateKeyB (secret)

Ready for exchange

Alice \(\rightarrow\) Bob

Sends PublicKeyA to Bob

PublicKeyA (shared)

Bob receives Alice’s key

Bob \(\rightarrow\) Alice

Sends PublicKeyB to Alice

PublicKeyB (shared)

Alice receives Bob’s key

Alice

Computes SharedSecret = PrivateKeyA \(\times\) PublicKeyB

PrivateKeyA + PublicKeyB

Gets shared secret

Bob

Computes SharedSecret = PrivateKeyB \(\times\) PublicKeyA

PrivateKeyB + PublicKeyA

Gets same shared secret

Both

Generate CA_Key from shared secret

CA_Key (derived)

Ready for AES encryption