This post is older than 2 years and might not be relevant anymore
More Info: Consider searching for newer posts

ECDH (P-256 elliptic curve) in key exchanging phase

Hi,

We are planing to use N52832 to design a product using BLE secure feature. Our customer want to know whether the key exchaning procedure is using ECDH (P-256 elliptic curve) in the BLE security manager. And we are new to Security Manager working procedure. But I found there is a paragraph in Core Specification 5.0 of Bluetooth to say, during public key exchaning phase, the public-private key is generated by device its own  Elliptic Curve Diffie-Hellman (ECDH) . We want to know whether the ECDH alogrithm is implemented inside the softdevice or not. If not, where we can find the implementation of EDCH using in public-private key generating procedure in the BLE security manager? If ECDH is implemented inside the softdevice, what kind of curve parameter does it use? 

Sorry for our no understanding for the Bluetooth core specification about the security manager. If I am wrong in the above decription, please corret me.

Thanks.

Related