what is an example?

What is the difference between a key agreement protocol and a key exchange protocol and what is an example?

What is the difference between a key agreement protocol and a key exchange protocol and what is an example?

A.
A key agreement protocol does not encrypt a symmetric key with an asymmetric key
– Diffie-Hellman

B.
A key agreement protocol does not encrypt a symmetric key with an asymmetric key
– RSA

C.
A key agreement protocol encrypts a symmetric key with an asymmetric key – Diffie-Hellman

D.
A key agreement protocol encrypts a symmetric key with an asymmetric key – RSA



Leave a Reply 4

Your email address will not be published. Required fields are marked *


Sachin

Sachin

Correct Answer is not visible with their explanation.
Admin, can you please update

justatesta

justatesta

Admin: no answer present. Also, according the RSA, they are the same thing. “A key agreement protocol, also called a key exchange protocol, is a series of steps used when two or more parties need to agree upon a key to use for a secret-key cryptosystem.” http://www.rsa.com/rsalabs/node.asp?id=2183

Sachin

Sachin

Key Agreement is different from Key exchange protocol.

Key Agreement: A & B both generate the session key using PKI but do not transfer. The generated session key on both side are same and is mutually agreed to use it for data transfer

Key Exchange protocol: A generate a session key and sent it securely to B. Session key is actually exchanged in this protocol.

Michael McNeil

Michael McNeil

Admin: Please fix, the answer is A & B

• The Diffie-Hellman protocol is a key agreement protocol and does not
provide encryption for data and cannot be used in digital signatures.

RSA has been implemented in applications; in operating systems by Microsoft, Apple,
Sun, and Novell; and at the hardware level in network interface cards, secure telephones,
and smart cards. It can be used as a key exchange protocol, meaning it is used to
encrypt the symmetric key to get it securely to its destination. RSA has been most commonly
used with the symmetric algorithm DES, which is quickly being replaced with
AES. So, when RSA is used as a key exchange protocol, a cryptosystem generates a symmetric
key using either the DES or AES algorithm. Then the system encrypts the symmetric
key with the receiver’s public key and sends it to the receiver. The symmetric key
is protected because only the individual