A security solutions architect has argued consistently to implement the most secure method of encrypting
corporate messages. The solution has been derided as not being cost effective by other members of the IT
department. The proposed solution uses symmetric keys to encrypt all messages and is very resistant to
unauthorized decryption. The method also requires special handling and security for all key material that goes
above and beyond most encryption systems. Which of the following is the solutions architect MOST likely trying
to implement?
A.
One time pads
B.
PKI
C.
Quantum cryptography
D.
Digital rights management