From d4960d0b517a9bc1fd3c371bb7948f715b3b5843 Mon Sep 17 00:00:00 2001
From: Pavlos Papadopoulos <44439128+pavlos-p@users.noreply.github.com>
Date: Fri, 25 Feb 2022 10:15:28 +0000
Subject: [PATCH] Update sample_ans.md
---
unit05_key_exchange/lab/sample_ans.md | 10 +++++-----
1 file changed, 5 insertions(+), 5 deletions(-)
diff --git a/unit05_key_exchange/lab/sample_ans.md b/unit05_key_exchange/lab/sample_ans.md
index 6b91251..2fbfec3 100644
--- a/unit05_key_exchange/lab/sample_ans.md
+++ b/unit05_key_exchange/lab/sample_ans.md
@@ -144,15 +144,15 @@ By doing a search on the Internet, which curve does Bitcoin use?
Tor network, IoT, etc
### Can you explain how you would use these EC parameters to perform the ECDH key exchange?
-Alice generates a, and then a value of aG (mod p).
+Alice generates a, and then a value of aG (mod p).
-Bob generates b, and then a value of bG (mod p).
+Bob generates b, and then a value of bG (mod p).
-Alice passes aG (mod p) to Bob.
+Alice passes aG (mod p) to Bob.
-Bob passes bG (mod p) to Alice.
+Bob passes bG (mod p) to Alice.
-Alice computes abG (mod p), and Bob also computes abG (mod p), and they have a shared secret.
+Alice computes abG (mod p), and Bob also computes abG (mod p), and they have a shared secret.