After determining which systems are allowed to communicate with each other and granting permission for the two systems to establish a connection, the _________ provides a one-time session key for that connection.
a. network administrator
b. firewall
c. encryption algorithm
d. antivirus software