Which of the following algorithms is appropriate for se…

An organization wants to conduct secure transactions of large data files. Before encrypting and exchanging the
data files, the organization wants to ensure a secure exchange of keys. Which of the following algorithms is
appropriate for securing the key exchange?

An organization wants to conduct secure transactions of large data files. Before encrypting and exchanging the
data files, the organization wants to ensure a secure exchange of keys. Which of the following algorithms is
appropriate for securing the key exchange?

A.
DES

B.
Blowfish

C.
DSA

D.
Diffie-Hellman

E.
3DES



Leave a Reply 0

Your email address will not be published. Required fields are marked *