Which description of the Diffie-Hellman protocol is true?

Which description of the Diffie-Hellman protocol is true?

Which description of the Diffie-Hellman protocol is true?

A.
It uses symmetrical encryption to provide data confidentiality over an unsecured communications channel.

B.
It uses asymmetrical encryption to provide authentication over an unsecured communications channel.

C.
It is used within the IKE Phase 1 exchange to provide peer authentication.

D.
It provides a way for two peers to establish a shared-secret key, which only they will know, even though they are communicating over an unsecured channel.

E.
It is a data integrity algorithm that is used within the IKE exchanges to guarantee the integrity of the message of the IKE exchanges.

Explanation:



Leave a Reply 2

Your email address will not be published. Required fields are marked *


Lonix

Lonix

DH (assymetric encryption) enables secure exchange of shared secret to be used for symmetric encryption

none

none

D:
Diffie-Hellman key exchange protocol. DH is an asymmetrical algorithm that
allows two devices to negotiate and establish shared secret keying material (keys)
over an untrusted network. The interesting thing about DH is that although the
algorithm itself is asymmetrical, the keys generated by the exchange are symmetrical
keys that can then be used with symmetrical algorithms such as Triple Digital
Encryption Standard (3DES) and Advanced Encryption Standard (AES) .