Which of the following protocols should be used for key exchange?

A network engineer is configuring a VPN tunnel connecting a company’s network to a business partner.
Which of the following protocols should be used for key exchange?

A network engineer is configuring a VPN tunnel connecting a company’s network to a business partner.
Which of the following protocols should be used for key exchange?

A.
SHA-1

B.
RC4

C.
Blowfish

D.
Diffie-Hellman



Leave a Reply to IThelper Cancel reply2

Your email address will not be published. Required fields are marked *

three × 1 =


SecurityGuy

SecurityGuy

The answer is D

Session Negotiation

From Cisco document
During session negotiation, IKE allows parties to negotiate how they will conduct authentication and how they will protect any future negotiations (that is, IPSec tunnel negotiation). These items are negotiated:

Authentication method – This is one of the methods listed in the Authentication section of this document.

Key exchange algorithm – This is a mathematical technique for securely exchanging cryptographic keys over a public medium (Diffie-Hellman). The keys are used in the encryption and packet-signature algorithms.

IThelper

IThelper

It’s D.

Diffie-Hellman is an algorithm used to establish a shared secret between two parties. It is primarily used as a method of exchanging cryptography keys for use in symmetric encryption algorithms like AES. The algorithm in itself is very simple