William, 
 
have a look at MODP (Modular Exponential DH Groups) referenced in RFC5246: 
 
RFC2409 defines primes for 768 and 1024 bit, and
RFC3526 defines primes for 1536, 2048, and 3072 bit. 
(The generator is always 2.)
 
Peter-Michael

  _____  

From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org]  
 On Behalf
Of William Cai
Sent: Monday, July 06, 2009 3:25 AM
To: openssl-users@openssl.org
Subject: Re: a question about Diffie-Hellman key exchange mode


Thanks Michael! Could you please share me some information about when/how to 
agree upon p
& g? 

Thanks,
William


  _____  

From: Michael Sierchio <ku...@tenebras.com>
To: openssl-users@openssl.org
Sent: Sunday, July 5, 2009 11:58:42 PM
Subject: Re: a question about Diffie-Hellman key exchange mode

William Cai wrote:

> According to my understanding, Diffie-Hellman algorithm is based on
> something like this,
> 1. public prime number, p
> 2. public base, g
> 3. Side A's private key, a
> 4. Side A's public key, A = g ^ a mod p
> 5. Side B's private key, b
> 6. Side B's public key, B = g ^ b mod p
> 
> The question is that which items above the Diffie-Hellman public
> parameters consist of? If they are 1, 2 and 4, then we need at least an
> additional step pass the public prime number and public base to the
> other side, otherwise, the other side cannot calculate its public key.
> right? But I don't see such description in the paper. Are public prime
> number and public base presetted?

Yes, the p and g are well known and agreed upon in advance.


______________________________________________________________________
OpenSSL Project                                http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                          majord...@openssl.org

Reply via email to