DH Key exchange
by Cyrus Lok on Monday, March 29, 2010 at 8:31pm
1. R1 and R2 both generated a set of private and public keys using the DH formula. Two routers agreed on two non-secret numbers.
2. R1 sends its public key over to R2. R2 did the same.
3. R1 uses R2’s public key and its own private key and calculate a shared-secret key with DH algorithm. R2 did the same. The end result is both R1 and R2 produce identical secret key.