Which of the following is the BEST technology for the sender to use in order to secure the in-band
exchange of a shared key?
A.
Steganography
B.
Hashing algorithm
C.
Asymmetric cryptography
D.
Steam cipher
Which of the following is the BEST technology for the sender to use in order to secure the in-band
exchange of a shared key?
Which of the following is the BEST technology for the sender to use in order to secure the in-band
exchange of a shared key?
A.
Steganography
B.
Hashing algorithm
C.
Asymmetric cryptography
D.
Steam cipher