FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF NETWORK SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the following process is used in IPSEC to negotiate symmetric keys securely between endpoints over an unsecure intermediate media?
A
Diffie-Hellman Key Exchange
B
Advanced Encryption Standard (AES)
C
Secure Hashing Algorithm (SHA)
D
RSA
Explanation: 

Detailed explanation-1: -Purposes of Encryption IPSec uses cryptography to provide three basic services: Authentication. Data integrity. Data confidentiality.

Detailed explanation-2: -Diffie–Hellman Key Exchange Protocol Based on public key cryptography, the D-H algorithm is a method for securely exchanging a shared key between two parties over an untrusted network. It is an asymmetric cipher used by several protocols including SSL, SSH, and IPSec.

Detailed explanation-3: -Keyword cipher is a form of monoalphabetic substitution. A keyword is used as the key, and it determines the letter matchings of the cipher alphabet to the plain alphabet. Repeats of letters in the word are removed, then the cipher alphabet is generated with the keyword matching to A, B, C, etc.

Detailed explanation-4: -AES – Advanced encryption standard, trusted by many standard organizations. It can encrypt 128-bit, 192-bit as well as 256-bit. AES is a symmetric encryption algorithm that is mostly in use today.

There is 1 question to complete.