Communication between end systems is encrypted using a key, often known as
(a) temporary key
(b) section key
(c) line key
(d) session key
I have been asked this question during an online exam.
My enquiry is from Symmetric Key Distribution in section Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security