I have 2 questions about LE Secure Connections.
1. What are the decisions of PKa and PKb passed in "2.3.5.6.1 Public Key Exchange" of BLUETOOTH SPECIFICATION Version 4.2 [Vol 3, Part H]?
2. Is "2.3.5.6.2 Authentication Stage 1 - Just Works or Numeric Comparison" of BLUETOOTH SPECIFICATION Version 4.2 [Vol 3, Part H] not encrypted?Also, from what stage will it be encrypted?
Hi,
1. What do you mean by "What are the decisions" ? The PKa, PKb are the public keys generated by each peer and to be exchanged so they can use the keys to generate DHKey. The DHKey then will be used to generate LTK key.
2. Authentication Stage 1 is not encrypted. The link is encrypted right after the DH key check at Authentication Stage 2 (2.3.4.6.5). Please have a look here.
Thank you for answering
1. How is PKa, PKb generated?Is it generated with random numbers?
2. Thank you.Does that mean that STK is not used in LegacyPairing?
1. The Public key and private key of each device has to be randomly generated according to Elliptic Curve Diffie-Hellman (ECDH) rules. In our SDK this is done by calling nrf_crypto_ecc_key_pair_generate() which will use the micro-ecc module to generate the key pair.
2. There is no STK when doing LESC.