A security administrator must implement a secure key exchange protocol that will allow company
clients to autonomously exchange symmetric encryption keys over an unencrypted channel.
Which of the following MUST be implemented?

A.
SHA-256
B.
AES
C.
Diffie-Hellman
D.
3DES