One way to solve the key distribution problem is to use a line from a book that both the sender and the receiver possess. Which term best describes this method?
a) Symmetric encryption
b) Public key cryptography
c) One-time pad
d) Steganography