Protection against active attacks (falsification of data and transactions) is known as ___________ .
What will be an ideal response?
Question 2
The purpose of the _________ algorithm is to enable two users to exchange a secret key securely that then can be used for subsequent encryption of messages and depends on the difficulty of computing discrete logarithms for its effectiveness.
A. Diffie-Hellman B. RSA
C. DSS D. Rivest-Adleman