<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>ECDH (P-256 elliptic curve) in key exchanging phase</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/37278/ecdh-p-256-elliptic-curve-in-key-exchanging-phase</link><description>Hi, 
 
 We are planing to use N52832 to design a product using BLE secure feature. Our customer want to know whether the key exchaning procedure is using ECDH (P-256 elliptic curve) in the BLE security manager. And we are new to Security Manager working</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Wed, 08 Aug 2018 14:30:10 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/37278/ecdh-p-256-elliptic-curve-in-key-exchanging-phase" /><item><title>RE: ECDH (P-256 elliptic curve) in key exchanging phase</title><link>https://devzone.nordicsemi.com/thread/143407?ContentTypeID=1</link><pubDate>Wed, 08 Aug 2018 14:30:10 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:675e9e2e-c31c-4459-a4f2-f51c7f9a1379</guid><dc:creator>Einar Thorsrud</dc:creator><description>&lt;p&gt;You have to download the library yourself. The simplest way to do it is to go to &amp;lt;SDK&amp;gt;nRF5_SDK_15.0.0_a53641a\external\micro-ecc\ and run the build_all script. It will download and build the micro-ecc library for you.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: ECDH (P-256 elliptic curve) in key exchanging phase</title><link>https://devzone.nordicsemi.com/thread/143401?ContentTypeID=1</link><pubDate>Wed, 08 Aug 2018 14:14:59 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:f8c8190b-3268-40a0-b659-724efcddf5a7</guid><dc:creator>Bing</dc:creator><description>&lt;p&gt;Thanks for your quickly reply. I compile the example &amp;quot;&lt;a href="http://infocenter.nordicsemi.com/topic/com.nordic.infocenter.sdk5.v15.0.0/ble_sdk_app_multirole_lesc.html?cp=4_0_0_4_1_1_3"&gt;LE Secure Connections Multirole Example&lt;/a&gt;&amp;quot; in the directory SDKROOT\examples\ble_central_and_peripheral\experimental\ble_app_multirole_lesc, the keil mdk report the &amp;quot;micro_ecc_lib_nrf52.lib&amp;quot;.&amp;nbsp; After seaching the whole SDK,&amp;nbsp;I can&amp;#39;t find the lost library file. Where can I get it? Or&amp;nbsp;could you give me some web links to guide&amp;nbsp;us for&amp;nbsp;generating of this library file ?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: ECDH (P-256 elliptic curve) in key exchanging phase</title><link>https://devzone.nordicsemi.com/thread/143395?ContentTypeID=1</link><pubDate>Wed, 08 Aug 2018 13:56:36 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:bc694a29-e568-4ae3-be22-7f3cecd2d994</guid><dc:creator>Einar Thorsrud</dc:creator><description>&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;LE Secure Connections is a secure pairing method that replaces&amp;nbsp;LE&amp;nbsp;legacy parring. Both are ways to pair/bond, i.e. exchange encryption keys to be used to encrypt the Bluetooth packet exchange between two peers. LE Secure Connection is the more secure of the two and should be the preferred pairing method if high security is more important than supporting legacy devices. (You can also support both).&lt;/p&gt;
&lt;p&gt;The SDK has a example application that demonstrate its usage, the experimental &lt;a href="http://infocenter.nordicsemi.com/topic/com.nordic.infocenter.sdk5.v15.0.0/ble_sdk_app_multirole_lesc.html?cp=4_0_0_4_1_1_3"&gt;LE Secure Connections Multirole Example&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Best regards,&lt;/p&gt;
&lt;p&gt;Einar&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: ECDH (P-256 elliptic curve) in key exchanging phase</title><link>https://devzone.nordicsemi.com/thread/143386?ContentTypeID=1</link><pubDate>Wed, 08 Aug 2018 13:45:07 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:3eaa830e-30a8-4062-bbbc-8d4421d1f717</guid><dc:creator>Bing</dc:creator><description>&lt;p&gt;Thanks Einar. Now I know the SDK support ECDH. But I still have doubt for how and when to use this BLE LESC module.&amp;nbsp;Could you please give me a simple &lt;span&gt; &lt;/span&gt;&lt;span class="tran"&gt;usage&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;span class="tran"&gt;scenario.&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: ECDH (P-256 elliptic curve) in key exchanging phase</title><link>https://devzone.nordicsemi.com/thread/143370?ContentTypeID=1</link><pubDate>Wed, 08 Aug 2018 12:43:41 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:2096340c-d444-41c4-a1c1-bf422f747cbf</guid><dc:creator>Einar Thorsrud</dc:creator><description>&lt;p&gt;Hi Wang,&lt;/p&gt;
&lt;p&gt;The&amp;nbsp;ECDH algorithm is used for LE Secure Connections, which is an enhanced security feature introduced in Bluetooth version 4.2. It is not implemented in the SoftDevice (BLE stack) itself, but rather in the SDK &lt;a href="http://infocenter.nordicsemi.com/topic/com.nordic.infocenter.sdk5.v15.0.0/group__ble__lesc.html?cp=4_0_0_6_2_4"&gt;BLE LESC module&lt;/a&gt;. You can download the SDK from &lt;a href="https://developer.nordicsemi.com/nRF5_SDK/nRF5_SDK_v15.x.x/"&gt;here &lt;/a&gt;and analyze the implementation.&lt;/p&gt;
&lt;p&gt;Best regards,&lt;/p&gt;
&lt;p&gt;Einar&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>