From 3dd3c536986fe6b05c508fb64fa3c14f2d21ff28 Mon Sep 17 00:00:00 2001 From: Bill Buchanan Date: Sat, 5 Mar 2022 06:57:37 +0000 Subject: [PATCH] Update README.MD --- unit05_key_exchange/lab/README.MD | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-) diff --git a/unit05_key_exchange/lab/README.MD b/unit05_key_exchange/lab/README.MD index 4013c1a..23614f2 100644 --- a/unit05_key_exchange/lab/README.MD +++ b/unit05_key_exchange/lab/README.MD @@ -63,7 +63,7 @@ Do they match: [Yes] [No] ### B.1 Generate 768-bit Diffie-Hellman parameters: ``` -openssl dhparam -out dhparams.pem 768 -text +openssl dhparam -out dhparams.pem -text 768 ``` View your key with: @@ -92,27 +92,27 @@ How would we change the g value? ### B.2 Let’s look at the Elliptic curves we can create: -
+```
 openssl ecparam -list_curves
-
+``` We can create our elliptic parameter file with: -
+```
 openssl ecparam -name secp256k1 -out secp256k1.pem
-
+``` Now view the details with: -
+```
 openssl ecparam -in secp256k1.pem -text -param_enc explicit -noout
-
+``` What are the details of the key? Now we can create our key pair: -
+```
 openssl ecparam -in secp256k1.pem -genkey -noout -out mykey.pem
-
+``` Name three 160-bit curves: