![](https://cos-cdn.shuashuati.com/pipixue-wap/2020-1230-1107-56/ti_inject-812ce.png)
is NOT an issue with secret key cryptography.
A.
Security of the certification authority
B.
A networked group of m users with separate keys for each pair of users will require m(m-1)/2 keys
C.
Secure distribution of the keys
D.
Compromise of the keys can enable the attacker to impersonate the key owners and, therefore, read and send false messages