Which of the following is the BEST technology for the sender to use in order to secure the in-band exchange of
a shared key?
A.
Steganography
B.
Hashing algorithm
C.
Asymmetric cryptography
D.
Stream cipher
Which of the following is the BEST technology for the sender to use in order to secure the in-band exchange of
a shared key?
Which of the following is the BEST technology for the sender to use in order to secure the in-band exchange of
a shared key?
A.
Steganography
B.
Hashing algorithm
C.
Asymmetric cryptography
D.
Stream cipher