An organization is evaluating different key exchange mechanisms for a new secure messaging application. They require that the decryption of captured encrypted messages should be computationally infeasible even if the server's private key is compromised in the future. Which key exchange method should they employ to ensure this condition is met?
Elliptic Curve Diffie-Hellman (ECDH)
Implement SSL with PFS enabled
Static RSA key exchange
Elliptic Curve Diffie-Hellman Ephemeral (ECDHE)