Implementation of the Diffie-Hellman Key Exchange

- An active attacker (Oscar), capable of removing and adding messages, can easily break the core DH protocol . - By intercepting the public keys and replacing them, Oscar (O) can fool Alice and Bob into thinking that they share a secret key. Future Work: Exchange the shared key generated by the Diffie - Hellman algorithm over the network. ................
................