A decides to deliver this secret key (K₁) to B by transmitting it over the same insecure channel using a second encryption scheme (E₂).
a) Encryption methods
b) Key distribution
c) Insecure channels
d) Cryptographic protocols