Two parties wish to exchange encrypted messages using symmetric key cryptography. The parties do not have an out-of-band method for exchanging keys. The parties should use:
a. A stream cipher
b. Message digests
c. Public key cryptography
d. Diffie-Hellman key exchange
d. Diffie-Hellman key exchange
Computer Science & Information Technology
You might also like to view...
Driver regulation is a process Microsoft follows to validate files that a third-party manufacturer creates for use in a Windows 7 computer
Indicate whether the statement is true or false
Computer Science & Information Technology
Negative numbers greater than 2-127 are called _________.
A. negative overflow B. negative underflow C. positive overflow D. positive underflow
Computer Science & Information Technology