DH Key exchange
2. R1 sends its public key over to R2. R2 did the same.
3. R1 uses R2’s public key and its own private key and calculate a shared-secret key with DH algorithm. R2 did the same. The end result is both R1 and R2 produce identical secret key.