This is a cryptographic protocol that allows two parties to agree on a shared secret key over an insecure communication channel. It is based on the discrete logarithm problem in finite fields.
This is a cryptographic protocol that allows two parties to agree on a shared secret key over an insecure communication channel. It is based on the discrete logarithm problem in finite fields.