COMPUTER NETWORKING

NETWORK SECURITY

DIGITAL SIGNATURE

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which three protocols use asymmetric key algorithms? (Choose three.)
A
Secure Sockets Layer (SSL)
B
Secure File Transfer Protocol (SFTP)
C
Pretty Good Privacy (PGP)
D
Advanced Encryption Standard (AES)
E
Secure Shell (SSH)
Explanation: 

Detailed explanation-1: -S/MIME. GPG, an implementation of OpenPGP, and an Internet Standard. EMV, EMV Certificate Authority. IPsec. PGP. ZRTP, a secure VoIP protocol. Transport Layer Security standardized by IETF and its predecessor Secure Socket Layer. SILC. More items

Detailed explanation-2: -Common asymmetric encryption algorithms are essential in secure communication and data transmission. Examples of these algorithms include RSA, Diffie-Hellman, and Elliptic Curve Cryptography (ECC).

Detailed explanation-3: -This is the corresponding decryption process (decrypt an encrypted large document using public-key cryptography and symmetric crypto algorithm): Examples of such asymmetric encryption schemes are: RSA-OAEP, RSA-KEM and ECIES-KEM.

There is 1 question to complete.