User guide

c sends R
D
and KeyID to the BlackBerry Enterprise Server
4. The BlackBerry Enterprise Server performs the following actions:
a calculates that as R
D
approaches the point at infinity, R
D
is random
b selects a random value r
B
, where 1 < r
B
< p - 1 and calculates R
B
= r
B
P
c if R
D
= R
B
, calculates another value of R
B
d selects a random value e
D
, where 1 < e
D
< p - 1
e sends R
B
, e
D
, and KeyID to the device
5. The BlackBerry Router performs the following actions:
a observes the data that the BlackBerry Enterprise Server sends
b verifies that the value R
B
is random when the value R
B
approaches the point at infinity or when R
D
= R
B
c verifies that the value e
D
is random when the value e
D
= 0
d sends R
B
, e
D
, and KeyID to the device
6. The device performs the following actions:
a verifies that the value R
B
is random when the value R
B
approaches the point at infinity or when R
D
= R
B
b verifies that the value e
D
is random when the value e
D
= 0
c calculates y
D
= h - e
D
r
D
mod p
d selects a random value e
B
, where 1 < e
B
< p - 1
e sends y
D
and e
B
to the BlackBerry Enterprise Server
7. The BlackBerry Router performs the following actions:
a observes the data that the device sends
b verifies that the value e
B
is random if e
B
= 0 or e
B
= e
D
c forwards y
D
and e
B
to the BlackBerry Enterprise Server
8. The BlackBerry Enterprise Server performs the following actions:
a verifies that the value e
B
is random when the value e
D
= e
B
b verifies that the value e
D
is random when the value e
D
= 0
c computes y
B
= h - e
B
r
B
(mod p)
d sends y
B
to the device
9. One of the following actions occurs:
The BlackBerry Enterprise Server and device open an authenticated connection to each other if the device accepts
y
B
.
The device does not accept the connection request, and the BlackBerry Enterprise Server and device do not open
an authenticated connection to each other, if the device calculates the following:
Security Technical Overview Protecting communication with a device
80