108k views
5 votes
The actual method of key generation depends on the details of the authentication protocol used.

a) true
b) false

1 Answer

6 votes

Answer:

True is the correct answer .

Step-by-step explanation:

Key generation is the method that are used for the security purpose .The key generation is used in the encryption and decryption process that are totally depends type of the authentication protocol.We can used the particular program to produce the key .

The key generation is used in the cryptography. We also symmetric and asymmetric key concept for the key generation .Authentication and Key Agreement is one of the authentication protocol that are mainly used in the 3 g network that are depend on the key generation.

Therefore the given statement is true .

User Joh
by
4.0k points