Overview

Unlike RSA, where you can send messages of your choice, the DHKE is used to generate a secret number shared between Alice and Bob. This shared secret is then used as the key for a symmetric cryptosystem like AES.

The Key Exchange

A large prime
pp
and a generator
gFp,g0g \in \mathbb{F}_p, g \neq 0
are made public.
Alice and Bob choose their secret integers
aa
and
bb
respectively. They then compute the following:
A=gamodpB=gbmodpA = g^a \mod p \\ B = g^b \mod p
These numbers
AA
and
BB
are exchanged between Alice and Bob over a public channel. Once the other person's number is received, they then put it to the power of their secret integer, i.e. Alice computes
BaB^a
and Bob computes
AbA^b
, both modulo
pp
. Note that:
Ba=(gb)a=gab=(ga)b=AbB^a = (g^b)^a = g^{ab} = (g^a)^b = A^b
This means that once they do this, they are in possession of the same number, which they can then use as a shared secret.

The Discrete Logarithm Problem

The safety of the Diffie-Hellman Key Exchange is grounded on he difficulty of solving the discrete logarithm problem - the difficulty of computing
xx
given
gxamodpg^x \equiv a \mod p
You can see this in Overview presented above - the values
gamodpg^a \mod p
and
gbmodpg^b \mod p
are sent over a public channel, but because we cannot solve the DLP efficiently an attacker is unable to retrieve
aa
or
bb
. We say that the DLP is DHKE's trapdoor function.
As you may expect from here, many attacks on Diffie-Hellman rely on situations in which you can efficiently compute the discrete logarithm.