From d4960d0b517a9bc1fd3c371bb7948f715b3b5843 Mon Sep 17 00:00:00 2001 From: Pavlos Papadopoulos <44439128+pavlos-p@users.noreply.github.com> Date: Fri, 25 Feb 2022 10:15:28 +0000 Subject: [PATCH] Update sample_ans.md --- unit05_key_exchange/lab/sample_ans.md | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/unit05_key_exchange/lab/sample_ans.md b/unit05_key_exchange/lab/sample_ans.md index 6b91251..2fbfec3 100644 --- a/unit05_key_exchange/lab/sample_ans.md +++ b/unit05_key_exchange/lab/sample_ans.md @@ -144,15 +144,15 @@ By doing a search on the Internet, which curve does Bitcoin use? Tor network, IoT, etc ### Can you explain how you would use these EC parameters to perform the ECDH key exchange? -Alice generates a, and then a value of aG (mod p). +Alice generates a, and then a value of aG (mod p). -Bob generates b, and then a value of bG (mod p). +Bob generates b, and then a value of bG (mod p). -Alice passes aG (mod p) to Bob. +Alice passes aG (mod p) to Bob. -Bob passes bG (mod p) to Alice. +Bob passes bG (mod p) to Alice. -Alice computes abG (mod p), and Bob also computes abG (mod p), and they have a shared secret. +Alice computes abG (mod p), and Bob also computes abG (mod p), and they have a shared secret.