A security administrator must implement a secure key exchange protocol that will allow company clients to
autonomously exchange symmetric encryption keys over an unencrypted channel. Which of the following
MUST be implemented?
Diffie-Hellman key exchange (D-H) is a means of securely generating symmetric encryption keys across an