summaryrefslogtreecommitdiff
path: root/3446/CH13/EX13.2/Ex13_2.sce
diff options
context:
space:
mode:
authorprashantsinalkar2017-10-10 12:27:19 +0530
committerprashantsinalkar2017-10-10 12:27:19 +0530
commit7f60ea012dd2524dae921a2a35adbf7ef21f2bb6 (patch)
treedbb9e3ddb5fc829e7c5c7e6be99b2c4ba356132c /3446/CH13/EX13.2/Ex13_2.sce
parentb1f5c3f8d6671b4331cef1dcebdf63b7a43a3a2b (diff)
downloadScilab-TBC-Uploads-7f60ea012dd2524dae921a2a35adbf7ef21f2bb6.tar.gz
Scilab-TBC-Uploads-7f60ea012dd2524dae921a2a35adbf7ef21f2bb6.tar.bz2
Scilab-TBC-Uploads-7f60ea012dd2524dae921a2a35adbf7ef21f2bb6.zip
initial commit / add all books
Diffstat (limited to '3446/CH13/EX13.2/Ex13_2.sce')
-rw-r--r--3446/CH13/EX13.2/Ex13_2.sce17
1 files changed, 17 insertions, 0 deletions
diff --git a/3446/CH13/EX13.2/Ex13_2.sce b/3446/CH13/EX13.2/Ex13_2.sce
new file mode 100644
index 000000000..8c7b2c07a
--- /dev/null
+++ b/3446/CH13/EX13.2/Ex13_2.sce
@@ -0,0 +1,17 @@
+// Exa 13.2
+// To determine secret encrypting key K using DH key exchange algorithm.
+
+clc;
+clear all;
+
+p=23; //prime number that both parties agreed upon
+g=5;// g is primitive mod p
+a=6; //party A choosen number
+b=15; //party B choosen number
+
+//solution
+printf('Party A sends to party B as (g^a mod p) = %d \n',modulo(g^a,23));
+printf(' Party B sends to party A as (g^b mod p) = %d \n',modulo(g^b,23));
+printf(' Party A computes secret key as ((g^b modp)^a mod p) = %d \n',modulo(modulo(g^b,23)^a,p));
+printf(' Party B computes secret key as ((g^a modp)^b mod p) = %d \n',modulo(modulo(g^a,23)^b,p));
+disp("Thus both parties uses k=2 as secret key for encryption");