Unformatted text preview: What is the fundamental challenge in the use of asymmetric key cryptography? Explain. 2. What is the most common combination of IPSEC protocol and transport mode? Describe. Why is it the most popular combination?...
View Full Document
- Spring '09
- Public-key cryptography, Symmetric Key Cryptography, Symmetric-key algorithm, Asymmetric Key Cryptography, upper righthand corner, Fundamental challenge