CCNA Practice Exam 2026 – Complete Study Resource

Get more with Examzify Plus

Remove ads, unlock favorites, save progress, and access premium tools across devices.

FavoritesSave progressAd-free
From $9.99Learn more

1 / 1055

What are two common algorithms used in asymmetric key cryptography?

MD5 and SHA

RSA and Diffe-Hellman

The choice of RSA and Diffie-Hellman as common algorithms used in asymmetric key cryptography is indeed accurate. RSA (Rivest-Shamir-Adleman) is one of the earliest and widely used public key algorithms. It allows secure data transmission through key encryption, enabling secure communication over potentially insecure channels.

Diffie-Hellman, on the other hand, is primarily used for secure key exchange, which allows two parties to establish a shared secret over an insecure channel without having to share the secret itself. Both algorithms are fundamental to establishing secure communications in various protocols, including HTTPS and other secure data transmissions.

The other options listed do not fit within the context of asymmetric key cryptography. MD5 and SHA are cryptographic hash functions rather than asymmetric algorithms. AES and DES are symmetric key algorithms, relying on the same key for both encryption and decryption. CBF and GFE do not correspond to recognized cryptographic standards or algorithms, further illustrating why they are not applicable in this context.

Get further explanation with Examzify DeepDiveBeta

AES and DES

CBF and GFE

Next Question
Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy