Technical Deep Dive

How It Works

A deep dive into our dual-key protocol, hybrid encryption, and secure transfer mechanisms.

📝Key Generation Concept

The device creates two distinct key pairs:

PKAHardware-backed RSA key pair (TEE)
PKBSoftware-backed RSA key pair

Protocol Steps

1

User enters username

2

Server provides a nonce

3

Device creates hardware key with attestation (PKA)

4

Device creates software key (PKB)

5

PKA signs PKB + username + nonce

6

Everything is sent to the server

7

Server verifies: nonce freshness, attestation challenge, certificate chain, signature validity

8

Data stored securely in database

(Sequence diagram Page 28, Code Pages 43-47)

Protocol Architecture

End-to-end authentication flow

📱
Client Device
Android App + TEE
🔐
Hybrid Encryption
RSA + AES-256
☁️
Server
Verification + Storage