D–H Problems
Not in itself an encryption method – we
must still do a secret key encryption
Subject to a “man in the middle” attack
(Alice thinks she is talking to Bob, but
actually Trudy is intercepting all of the
messages and substitution her own)