Just run the program. All things are set. Also if you wish you can change the secret values a
of Alice's or b
of Bob's. We just check whether a secret private key is generated or not. If a*(b*P) == b*(a*P)
then we are succeed and secure private key abP
is generated and they can use it as for further coomunications.
- To make :
make
- To make and run :
make run
- To clean :
make clean
gcc ecdh.c functions.c -o output
./output