Consider the elliptic curve group based on the equation y2 = x3 + ax +b mod p where a = 1740, b 592, and p=2687 We will use these values as the parameters for a session of Elliptic Curve Diffie-Hellman Key Exchange. We will use P = (4,908) as a subgroup generator. You may want to use mathematical software to help with the computations, such as the Sage Cell Server (SCS). On the SCS you can construct this group as: G=EllipticCurve(GF(2687),[1740,592]) Here is a working example. (Note that the output on SCS is in the form of homogeneous coordinates. If you do not care about the details simply ignore the 3rd coordinate of output.) Alice selects the private key 33 and Bob selects the private key 9. What is A, the public key of Alice? What is B, the public key of Bob? After exchanging public keys, Alice and Bob both derive the same secret elliptic curve point TAB. The shared secret will be the x-coordinate of TAB. What is it?