Which description of the Diffie-Hellman protocol istrue?
A.
It uses symmetrical encryption to provide data confidentiality over an unsecured communications channel.
B.
It uses asymmetrical encryption to provide authentication over an unsecured communications channel.
C.
It is used within the IKE Phase 1 exchange to provide peer authentication.
D.
It provides a way for two peers to establish a shared-secret key, which only they will know, even though they
are communicating over an unsecured channel.
E.
It is a data integrity algorithm that is used within the IKE exchanges to guarantee the integrity ofthe
message of the IKE exchanges.