Your company, SecureTech Inc., is planning to transmit some sensitive data over an unsecured communication channel. As a cyber security expert, you decide to use symmetric key encryption to protect the data. However, you must also ensure the secure exchange of the symmetric key. Which of the following protocols would you recommend to the team to achieve this?
LordXander
7 months, 3 weeks agoinsaniunt
9 months, 2 weeks ago[Removed]
9 months, 2 weeks ago