Information Security

In symmetric encryption, why is it important to exchange keys “out of band”? 2. Please explain in one paragraph how Public Key Infrastructure (PKI) protects valuable information assets. 3. What is
the difference between “digital signature” and “digital certificate”? Question No. 2 1. Discuss how Netscape developed the Secure Socket Layer (SSL) protocol to use public-key encryption to secure
a channel over the public Internet, thus enabling secure communications. 2. Explain how the most common hybrid encryption system is based on the Diffie-Hellman Key Exchange method, which is a
method for exchanging private keys using public-key encryption.