A common asymmetric algorithm utilizes the user’s login name to create the key to encrypt communications.
To ensure the key is Afferent each time the user encrypts data which of the following should be added to the login name?
A . PGP
B . Nonce
C . PSK
D . Certificate
Answer: B