Why do you need random number for ECDH shared key computation
Let’s assume that authentication with certificates has been well performed, next step is to generate short-term private&public ECC keys for ECDH shared key computation.
Alice: Generates keyA with RNG and calculates pubkeyA, shares pub… Continue reading Why do you need random number for ECDH shared key computation