Acting as Alice, choose a secret number and two primes.
Your public key will be generated from this information
Here we see the only information that is exchanged between Alice and Bob, with Eve acting as an eavesdropper.
Acting as Bob, choose a secret key.
Your public key, as well as the shared secret key, will be generated.