Thanks Michael! Could you please share me some information about when/how to agree upon p & g?
Thanks, William ________________________________ From: Michael Sierchio <ku...@tenebras.com> To: openssl-users@openssl.org Sent: Sunday, July 5, 2009 11:58:42 PM Subject: Re: a question about Diffie-Hellman key exchange mode William Cai wrote: > According to my understanding, Diffie-Hellman algorithm is based on > something like this, > 1. public prime number, p > 2. public base, g > 3. Side A's private key, a > 4. Side A's public key, A = g ^ a mod p > 5. Side B's private key, b > 6. Side B's public key, B = g ^ b mod p > > The question is that which items above the Diffie-Hellman public > parameters consist of? If they are 1, 2 and 4, then we need at least an > additional step pass the public prime number and public base to the > other side, otherwise, the other side cannot calculate its public key. > right? But I don't see such description in the paper. Are public prime > number and public base presetted? Yes, the p and g are well known and agreed upon in advance. ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List openssl-users@openssl.org Automated List Manager majord...@openssl.org