Technical Deep Dive
How It Works
A deep dive into our dual-key protocol, hybrid encryption, and secure transfer mechanisms.
📝Key Generation Concept
The device creates two distinct key pairs:
PKAHardware-backed RSA key pair (TEE)
PKBSoftware-backed RSA key pair
▶Protocol Steps
1
User enters username
2
Server provides a nonce
3
Device creates hardware key with attestation (PKA)
4
Device creates software key (PKB)
5
PKA signs PKB + username + nonce
6
Everything is sent to the server
7
Server verifies: nonce freshness, attestation challenge, certificate chain, signature validity
8
Data stored securely in database
(Sequence diagram Page 28, Code Pages 43-47)