Two parties wish to exchange encrypted messages using symmetric key cryptography. The parties do not have an out-of-band method for exchanging keys. The parties should use:

a. A stream cipher
b. Message digests
c. Public key cryptography
d. Diffie-Hellman key exchange


d. Diffie-Hellman key exchange

Computer Science & Information Technology

You might also like to view...

A occurs when an executed statement does not directly follow the previously executed statement in the written application.

a) transition b) flow c) logical error d) transfer of control

Computer Science & Information Technology

Text that is inserted into a(n) ________ displays on the bottom of every page

Fill in the blank(s) with correct word

Computer Science & Information Technology

Your company wants to secure the new data center physically. The company has hired a security guard but wants to find a way so that only one person at a time can enter in the data center. As people enter, they will have to show the security guard identification that authorizes them to enter the data center.   What is your company’s new security called?

A. Theft prevention B. Mantrap C. Entry control roster D. Security outpost

Computer Science & Information Technology

Name the five parts that make up a generic frame.

What will be an ideal response?

Computer Science & Information Technology