PrepAway - Latest Free Exam Questions & Answers

Which description of the Diffie-Hellman protocol is true?

Which description of the Diffie-Hellman protocol is true?

PrepAway - Latest Free Exam Questions & Answers

A.
It uses symmetrical encryption to provide data confidentiality over an unsecured communications channel.

B.
It uses asymmetrical encryption to provide authentication over an unsecured communications channel.

C.
It is used within the IKE Phase 1 exchange to provide peer authentication.

D.
It provides a way for two peers to establish a shared-secret key, which only they will know, even though they are communicating over an unsecured channel.

E.
It is a data integrity algorithm that is used within the IKE exchanges to guarantee the integrity of the message of the IKE exchanges.

Explanation:

2 Comments on “Which description of the Diffie-Hellman protocol is true?

  1. none says:

    D:
    Diffie-Hellman key exchange protocol. DH is an asymmetrical algorithm that
    allows two devices to negotiate and establish shared secret keying material (keys)
    over an untrusted network. The interesting thing about DH is that although the
    algorithm itself is asymmetrical, the keys generated by the exchange are symmetrical
    keys that can then be used with symmetrical algorithms such as Triple Digital
    Encryption Standard (3DES) and Advanced Encryption Standard (AES) .




    0



    0

Leave a Reply