Matt, a security analyst, needs to select an asymmetric encryption method that allows for the same level of encryption strength with a lower key length than is typically necessary. Which of the following encryption methods offers this capability?
A.
Twofish
B.
Diffie-Hellman
C.
ECC
D.
RSA