- Alice, Bob and Charlie have a secret key a=3, b=4, c=5, in that order.
- They would like to find a common secret key using Diffie-Hellan key exchange protocol (with g=2, p=5).
- Suppose that there is no man-in-the-middle attacker.
- Demonstrate how they can share a common secret key with the above mentioned numbers.