The Diffie-Hellman key exchange algorithm can be used with SSH.
But how does SSH exchange the large safe prime p
and the generator for a subgroup of GF(p) g
?
According to RFC 4253 the first steps are to send e
& f
which are calculated depending via:
e = g^x mod p
f = g^y mod p
Now x
& y
are randomly generated but how do both parties come to the same values of g
and p
? There seems to be no exchange happening of them.
Does anybody have an explanation for this?