So Diffe Hellman is subject to a MITM attack where two parties exchange:
X = g^x mod n and Y = g^y mod n.
Now presumably this can be protected against by using the Rivest Shamir interlock protocol where we split a message into two pieces and exchange them bit by bit. What i want to know is how we can split g^x mod n into two pieces for usage with Rivest Shamir?