I need code to simulate attacking the system by recovering the secret key from the data sent in the clear. And an explain that attack would not work in a real Diffie-Hellman implementation

More Sachin Sharma's questions See All
Similar questions and discussions