Full AWS Practitioner Certification Question

Which of the following asymmetric algorithms is commonly used for secure key exchange?