Assume an intruder has compromised your current lKE Phase 1 and Phase 2 keys.
Which of the following options will end the intruder’s access after the next Phase 2 exchange occurs?
A.
Phase 3 Key Revocation
B.
Perfect Forward Secrecy
C.
MD5 Hash Completion
D.
SHA1 Hash Completion
E.
DES Key Reset
I choose B