A total of seven messages are required in the Public-Key distribution scenario. However, the initial five messages need to be used only infrequently because both A and B can save the other’s public key for future – a technique known as ____
(a) time stamping
(b) polling
(c) caching
(d) squeezing
I got this question during an internship interview.
My doubt stems from Public Keys and X.509 Certificates-III topic in chapter Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security