This preview shows page 1. Sign up to view the full content.
Unformatted text preview: What is the fundamental challenge in the use of asymmetric key cryptography? Explain. 2. What is the most common combination of IPSEC protocol and transport mode? Describe. Why is it the most popular combination?...
View Full Document
- Spring '09