The strength of any cryptographic system rests with the _________ technique, a term that refers to the means of delivering a key to two parties that wish to exchange data without allowing others to see the key.
a. encryption
b. key distribution
c. cryptographic algorithm
d. secure communication