Which of the following is a primary weakness of asymmetric-key encryption?
A.
It is slow because it requires extensive calculations by the computer.
B.
It can lead to the corruption of encrypted data during network transfer.
C.
It is reliant on the Secure Sockets Layer (SSL) standard, which has been compromised.
D.
It is difficult to transfer any portion of an asymmetric key securely.