Asymmetric algorithms are used for which of the following when using Secure Sockets Layer/Transport Layer Security (SSL/ TLS) for implementing network security?
A. Peer authentication
B. Payload data encryption
C. Session encryption
D. Hashing digest
A. Peer authentication
B. Payload data encryption
C. Session encryption
D. Hashing digest