A security administrator must implement a secure key exchange protocol that will allow company
clients to autonomously exchange symmetric encryption keys over an unencrypted channel.
Which of the following MUST be implemented?
A.
SHA-256
B.
AES
C.
Diffie-Hellman
D.
3DES
Explanation:
Diffie-Hellman key exchange (D-H) is a means of securely generating symmetric encryption keys
across an insecure medium.