International Journal for Technological Research in Engineering (IJTRE)
Ensuring secure communication over internet is extremely challenging because of the dynamic nature of the network and the lack of centralized management. For this reason, Diffie-Hellman key agreement protocol is introduced for secure communication over network, but Diffie-Hellman key agreement protocol implementations have been plagued by serious security flaws. The attacks can be very subtle and, more often than not, have not been taken into account by protocol designers. In this paper, the authors discuss both theoretical attacks against the Diffie-Hellman key agreement protocol and attacks based on implementation details and also they have used a random parameter to make this algorithm more efficient.