A network engineer is configuring a VPN tunnel connecting a company’s network to a business partner. Which of the following protocols should be used for key exchange?
A. SHA-1
B. RC4
C. Blowfish
D. Diffie-Hellman
2 Comments on “Which of the following protocols should be used for key exchange?”
SecurityGuysays:
The answer is D
Session Negotiation
From Cisco document
During session negotiation, IKE allows parties to negotiate how they will conduct authentication and how they will protect any future negotiations (that is, IPSec tunnel negotiation). These items are negotiated:
Authentication method – This is one of the methods listed in the Authentication section of this document.
Key exchange algorithm – This is a mathematical technique for securely exchanging cryptographic keys over a public medium (Diffie-Hellman). The keys are used in the encryption and packet-signature algorithms.
0
0
IThelpersays:
It’s D.
Diffie-Hellman is an algorithm used to establish a shared secret between two parties. It is primarily used as a method of exchanging cryptography keys for use in symmetric encryption algorithms like AES. The algorithm in itself is very simple
The answer is D
Session Negotiation
From Cisco document
During session negotiation, IKE allows parties to negotiate how they will conduct authentication and how they will protect any future negotiations (that is, IPSec tunnel negotiation). These items are negotiated:
Authentication method – This is one of the methods listed in the Authentication section of this document.
Key exchange algorithm – This is a mathematical technique for securely exchanging cryptographic keys over a public medium (Diffie-Hellman). The keys are used in the encryption and packet-signature algorithms.
0
0
It’s D.
Diffie-Hellman is an algorithm used to establish a shared secret between two parties. It is primarily used as a method of exchanging cryptography keys for use in symmetric encryption algorithms like AES. The algorithm in itself is very simple
0
0