1.Notification
Process
2.Set KEY and IV
3.Encrypted notification data and transmit to central
4.Central receive encrypted data
5.Central enter IV and KEY
6.Central decrypted
7.Central enter wrong IV to decrypted
8.Central enter wrong KEY to decrypted
1.Write
Process
2.Set IV.
3.Set KEY.
4.Encrypted write data and transmit to peripheral.
5.Peripheral receive encrypted data
6.Peripheral enter KEY and IV
7.Peripheral decrypted
1.Write
Process
2.Set IV.
3.Set KEY.
4.Encrypted write data and transmit to peripheral.
5.Peripheral receive encrypted data
6.Peripheral enter KEY and IV
7.Peripheral decrypted