Consider the elliptic curve group based on the equation
y2≡x3+ax+bmodp
where a=3267, b=695, and p=3623
.
We will use these values as the parameters for a session of Elliptic Curve Diffie-Hellman Key Exchange. We will use P=(0,858)
as a subgroup generator.
You may want to use mathematical software to help with the computations, such as the Sage Cell Server (SCS).
On the SCS you can construct this group as:
G=EllipticCurve(GF(3623),[3267,695])
Here is a working example.
(Note that the output on SCS is in the form of homogeneous coordinates. If you do not care about the details simply ignore the 3rd coordinate of output.)
Alice selects the private key 38
and Bob selects the private key 11
.
What is A
, the public key of Alice?
What is B
, the public key of Bob?
After exchanging public keys, Alice and Bob both derive the same secret elliptic curve point TAB
. The shared secret will be the x-coordinate of TAB
. What is it?