Phase 2 uses ___________, if not using Perfect Forward Secrecy.
A. Symmetric
B. Conditional
C. Sequential
D. Asymmetric
One Comment on “Phase 2 uses ___________, if not using Perfect Forward Secrecy.”
Gregsays:
I think the answer is actually C. Phase 2 definitely uses symmetric encryption, but it does that with or without PFS. PFS merely forces a renegotiation of the Phase I IKE process, TO AVOID having sequential numbers making it easier to decode the encryption.
I think the answer is actually C. Phase 2 definitely uses symmetric encryption, but it does that with or without PFS. PFS merely forces a renegotiation of the Phase I IKE process, TO AVOID having sequential numbers making it easier to decode the encryption.
0
0