An organization wants to conduct secure transactions of large data files. Before encrypting and exchanging the data files, the organization wants to ensure a secure exchange of keys.
Which of the following algorithms is ap
propriate for securing the key exchange?
A. DES
B. Blowfish
C. DSA
D. Diffie-Hellman
E. 3DES