R70 implements privacy by making no one but the intended parties to understand the communication, in the way of data encryption. The encryption is carried out by encryption software and a secret key. What do you need to decrypt the encrypted data?
A.
Shared key
B.
Hardware key
C.
Privatekey
D.
Software key
E.
combination of Shared key and Network key