there are some subtleties you probably want to consider when doing a key exchange. i'm not an expert on the subject but i just read an informative paper on it. it is at <URL: http://www.ee.technion.ac.il/~hugo/sigma.ps> (or .pdf) -- erno