This post is older than 2 years and might not be relevant anymore
More Info: Consider searching for newer posts

Encryption in data

Hi Team,

we are working on nrf52 and we doing encryption of the data.

on the receiver end I can understand if there is connection , the keys will be exchanged and after that the receiver can decode advertisement packets.

But I would like to know that without connection is there possibility to decodethe advertisements on receiver end as we are planning to send some advertisement with information which can be read by receiver without connection

Could there be way by which the receiver can decode this encrypted advertisement.

Thanks,

  • Luckily, the SoftDevice ( if it is an nRF device ) or BLE stack in the other end take care of this for you, no need for you to do anything in regards to the encryption.

    Thank you for response.
    But on other side of receiver its not nRF device, Its plain gateway which will be received the advertisements from nRF 52 transmitter.

    Still it would do?
    if yes, then how this packets would be encrypted as I think it can be decoded by any receiver as well

  • Zero.cool said:

    But on other side of receiver its not nRF device, Its plain gateway which will be received the advertisements from nRF 52 transmitter.

    Still it would do?

    Yes, this is fine. All certified BLE stack implementations will conform to the BLE protocol, and the LESC is part of the protocol, no worries.
    I can not speak to how you must go about doing this with the other BLE stack, but I should hope and expect it to be roughly as easy as it is to configure using our SoftDevices.

    Zero.cool said:
    if yes, then how this packets would be encrypted as I think it can be decoded by any receiver as well

    It is true that any receiver could potentially decode it - but that is needed to conform to the BLE specifications. Please have a look at the answers in this ticket, to see a more in-depth explanation of the LESC encryption.

    If you are still unsure of how this can be safe I recommend taking a look at the underlying Diffi-Hellman key exchange.

    Best regards,
    Karl

Related