People also needs to be careful of suspicious emails and messages and apply Protected searching patterns to attenuate their possibility of falling victim to phishing assaults. Implementation of Diffie-Hellman Algorithm Diffie-Hellman algorithm:The Diffie-Hellman algorithm is being used to determine a shared key that could be useful for top secret communications https://mgo77.org/