A company wants to create a communication scheme that is both secure and efficient, using the benefits of both symmetric and asymmetric encryption. How would they do this?
a) It isn’t possible to use symmetric and asymmetric encryption at the same time.
b) The company could use an asymmetric encryption key that they transmit to other parties via symmetric encryption.
c) The company can use a message authentication check (MAC) to keep their information secure.
d) The company could use a symmetric encryption key that they transmit to other parties via asymmetric encryption.