A.usedtoverifytheidentityofthepeer
B.usedbetweentheinitiatorandtherespondertoestablishabasicsecuritypolicy
C.usedtoestablishasymmetricsharedkeyviaapublickeyexchangeprocess
D.usedforasymmetricpublickeyencryption