Question 1: Explain each of the following encryption algorithms:
- Challenge-Handshake Authentication Protocol (CHAP)
- Diffie-Hellman Key Exchange
- Digital Signature Algorithm (DSA)
- Elliptic Curve Cryptography (ECC)
- Extensible Authentication Protocol (EAP)
- Message Digest Function (MD5)
- Rivest, Shamir, Adleman (RSA)
- Secure Hashing Algorithm (SHA)
Question 2: Evaluate how the encryption algorithms can be used to secure your company data.