When generating a new key pair, a security application asks the user to move the mouse and type
random characters on the keyboard. Which of the following BEST describes why this is
necessary?
A.
The user needs a non-repudiation data source in order for the application to generate the key
pair.
B.
The user is providing entropy so the application can use random data to create the key pair.
C.
The user is providing a diffusion point to the application to aid in creating the key pair.
D.
The application is requesting perfect forward secrecy from the user in order to create the key
pair.