Figure 1.

Figure 2.

Figure 3.

Figure 4.

Figure 5.

Figure 6.

ECC key generation process and transparency characteristics table
| Key Type | Generation process | Transparency |
|---|---|---|
| Initial private key | k | Only visible to yourself |
| Initial public key | K=kG | Visible to all |
| Derived Private Keys | Kt=k*HASH(x||t)mod n | Only visible to yourself |
| Derived Public Key | Kt=K*HASH(x||t)=ktG | Both sides of the communication are visible |
| Session Key | Kst=KAKBt=kBKAt | Both sides of the communication are visible |