Two parties wish to exchange encrypted messages using symmetric key cryptography. The parties do not have an out-of-band method for exchanging keys. The parties should use:

a. A stream cipher
b. Message digests
c. Public key cryptography
d. Diffie-Hellman key exchange

d. Diffie-Hellman key exchange

Computer Science & Information Technology

You might also like to view...

Driver regulation is a process Microsoft follows to validate files that a third-party manufacturer creates for use in a Windows 7 computer

Indicate whether the statement is true or false

Computer Science & Information Technology

Negative numbers greater than 2-127 are called _________.

A. negative overflow B. negative underflow C. positive overflow D. positive underflow

Computer Science & Information Technology