Date Added: Jul 2011
Most of the Network Security protocols provide security based on cryptography techniques. The secret key is the most significant data for most of these techniques. The keys should be secretly generated and distributed. Diffie Hellman's method is a well known key generation and authentication algorithm among public key cryptosystems. Accordingly using senders own private key and partner's public key, the shared session key could be calculated through discrete logarithm. This key could be used for securing further communication between the users. But it is weak in preventing man-in-the middle attack, since the entitie's identity is not included in the message while exchanging public keys.