A.ADHkeyexchangeisanalgorithmthatutilizesasymmetriccryptographickeys.
B.TheDHkeyexchangeisusedtoestablishasharedsecretoveraninsecuremediumduringanIPSecphase1exchange.
C.TheDHexchangeissusceptibletoman-in-the-middleattacks.
D.TheDHexchangeisusedtoauthenticatethepeerdeviceduringanIPSecphase1exchange.
E.ADHexchangeprovidesPerfectForwardSecrecy(PFS).
正确答案:参考A, B, C, E



