The specification of a protocol, along with the chosen key length (if variable) is known as –
(a) cipher suite
(b) system suite
(c) key set
(d) service set
The question was posed to me by my school principal while I was bunking the class.
Origin of the question is IEEE 802.11i WLAN Security topic in portion Wireless Network Security and Network Security Overview of Cryptograph & Network Security