DH-Key Exchange
[Image of Alice and Bob]
Alice and Bob want to communicate securely. They use DH-Key Exchange to establish a shared secret.
- Alice selects a private value,
, and computes her public value, . - Bob selects a private value,
, and computes his public value, . - Alice sends her public value to Bob.
- Bob sends his public value to Alice.
- Alice computes the shared secret,
. - Bob computes the shared secret,
. - Alice and Bob can now use the shared secret to encrypt their communications.
1 | g: 2 |