Why is the "intermediate" challenge needed in Bluetooth ECDH since the "real" verification is performed at the end with code comparison?
Why is step 4 needed? What does it protect in terms of security? Doesn’t the protection arrives from the last step so when Va and Vb (so called TK, Temporary Keys) are compared?
Other thing: I read somewhere that Cb is sent immediately an… Continue reading Why is the "intermediate" challenge needed in Bluetooth ECDH since the "real" verification is performed at the end with code comparison?