PGP (Pretty Good Privacy), SSL (Secure Sockets Layer), and IKE (Internet Key Exchange) use Public Key Cryptography for secure communication. They utilize:
Public and private key pairs
Asymmetric encryption for key exchange
Symmetric encryption for data confidentiality (after key exchange)
These protocols ensure secure data transfer over insecure networks.
Reference – CEH v13 Official Study Guide:
Module 20: Cryptography
Quote:
“Public key cryptography uses asymmetric key pairs for encryption and authentication. Protocols like PGP, SSL/TLS, and IKE rely on this to exchange keys and establish trust.”
Incorrect Options:
A & D. Digest/hash algorithms (e.g., MD5, SHA) ensure integrity, not encryption
B. Secret key refers to symmetric encryption, which is used after the public key exchange, not as the basis for these protocols