<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>BLE - Numeric comparison</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/77603/ble---numeric-comparison</link><description>Hi, 
 How does numeric comparison works? Shouldn&amp;#39;t both devices share parameters in order to display the same number? How can we be protected from MITM? 
 Thanks!</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Sun, 18 Jul 2021 19:38:36 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/77603/ble---numeric-comparison" /><item><title>RE: BLE - Numeric comparison</title><link>https://devzone.nordicsemi.com/thread/320573?ContentTypeID=1</link><pubDate>Sun, 18 Jul 2021 19:38:36 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:24895bf4-abc0-4985-bc7f-65f335fc39c5</guid><dc:creator>Dmitry</dc:creator><description>&lt;p&gt;Exactly.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE - Numeric comparison</title><link>https://devzone.nordicsemi.com/thread/320563?ContentTypeID=1</link><pubDate>Sun, 18 Jul 2021 17:31:18 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:f722626f-c08a-495f-a8d3-118e4a3ed8c4</guid><dc:creator>Roei</dc:creator><description>&lt;p&gt;Thanks!&lt;/p&gt;
&lt;p&gt;One more question - I assume the basic diffie-hellman (modulu functions) and elliptic curve diffie hellman work differently, but the idea of using public and private key and generating shared secret it the same, right?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE - Numeric comparison</title><link>https://devzone.nordicsemi.com/thread/320561?ContentTypeID=1</link><pubDate>Sun, 18 Jul 2021 16:37:53 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:c5d2e242-65f7-4636-aecd-b8e8a9c43bb2</guid><dc:creator>Dmitry</dc:creator><description>&lt;p&gt;g2 uses&amp;nbsp;both public keys and exchanged random numbers, not an ECDH secret:&lt;/p&gt;
&lt;p&gt;&lt;img src="https://devzone.nordicsemi.com/resized-image/__size/320x240/__key/communityserver-discussions-components-files/4/pastedimage1626625736158v1.png" alt=" " /&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE - Numeric comparison</title><link>https://devzone.nordicsemi.com/thread/320558?ContentTypeID=1</link><pubDate>Sun, 18 Jul 2021 15:51:15 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:9151378d-36ec-4f49-a6f1-d8fd7e5270c6</guid><dc:creator>Roei</dc:creator><description>&lt;p&gt;Ok,&lt;/p&gt;
&lt;p&gt;So the random number is generated from diffie-hellman key?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE - Numeric comparison</title><link>https://devzone.nordicsemi.com/thread/320557?ContentTypeID=1</link><pubDate>Sun, 18 Jul 2021 15:25:15 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:84146166-58de-4195-b19a-f28dde437bcf</guid><dc:creator>Dmitry</dc:creator><description>&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;function g2&amp;nbsp;includes both public keys. In case of MITM attack, one side will have PK(Alice)+PK(Eve), other side - PK(Eve)+PK(Bob), numbers will never match.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>