My task is to reproduce the plot below: It comes from this journal (pg 137-145) In this article, the authors describe a kleptographic attack called SETUP against Diffie-Hellman keys exchange. In particular, they write this algorithm: Now, in 2 the authors thought “Maybe we can implement honest DHKE and malicious DHKE, and then we compare the running time of the