The purpose of the __________ algorithm is to enable two users to exchange a secret key securely that can then be used for subsequent encryption of messages.

Fill in the blank(s) with the appropriate word(s).

Diffie-Hellman

Computer Science & Information Technology

You might also like to view...

The buses in a computer that connect peripheral (typically input and output) devices to the motherboard are often called _____.

A. ?power buses B. ?backside buses C. ?expansion buses D. ?cache buses

Computer Science & Information Technology

When you mark a document as final, it is saved as a read-only document.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology