tyronereevey9331 tyronereevey9331 29-03-2024 Computers and Technology contestada Cryptographic key distribution is typically done by phone. a) True b) False