The purpose of the __________ algorithm is to enable two users to exchange a secret key securely that can then be used for subsequent encryption of messages.
Fill in the blank(s) with the appropriate word(s).
Diffie-Hellman
Computer Science & Information Technology
You might also like to view...
The buses in a computer that connect peripheral (typically input and output) devices to the motherboard are often called _____.
A. ?power buses B. ?backside buses C. ?expansion buses D. ?cache buses
Computer Science & Information Technology
When you mark a document as final, it is saved as a read-only document.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology