ARMmbed

MbedTLS ECDH parameter exchange

Hi @roneld01 and everyone,

I had a few questions about mbedtls ecdh parameter exchange between a client and server and was wondering if anyone can help me out. I was able to successfully run the example ecdh_curve25519.c on my system where it generates the shared secret.

The next step is to split the example which means exchanging public keys and the parameters and then generating the shared secret.

I’m running the mbedTLS lib on a Kinetis K24 ARM Cortex-M4 chip.
In my case my hardware which has the K24 micro-controller is the Server and my Android and iOS app that connects via BLE to my hardware would be the Client

My questions:

  1. Now that I want to split the example, which parameters does my firmware (Server side) need to give the Client (iOS/android) to the client?

  2. How do I get those parameters from mbedTLS ecdh library? Is there any example which I can refer to?

  3. The iOS/android app might not use mbedTLS library for ecdh. In that case, how would the handshake work? And what parameters would be sufficient for the handshake?
    For an example - I’ve seen that OpenSSL writes keys in .pem files and looks like it’s Base64 encoded whereas the mbedtls library ecdh_curve25519.c example has cli_to_srv and srv_to_cli 32-byte buffers which stores the client and server public keys.

Any help is appreciated!

Thank you!

Hi @dhavalhparikh26

The ecdh_curve25519 was written to show how to generate the secret in the curve 25519, as it is a bit different than how we generate the secret on other curves.
If you wish to use other curves, I would suggest you look at our test functions

In this test, you will see the two contexts srv and cli. Each one simulates what needs to be called in the server and client, respectively.
Mbed TLS implements ECDH algorithm, as defined in NIST SP 800-56A.
.pem format indeed is Base64 encoded, however, ar ethe keys that were written were actually the shared secret?

The shared secret that is calculated is not an asymmetric key. It is some big number (size depends on the used curve), that should be used to derive a symmetric key.
Regards,
Mbed TLS Team member
Ron