A total of seven messages are required in the Public-Key distribution scenario. However, the initial five messages need to be used only infrequently because both A and B can save the other’s public key for future – a technique known as ____________
(a) time stamping
(b) polling
(c) caching
(d) squeezing
The question was posed to me during an interview.
My doubt is from Overview in section Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security