is NOT an issue with secret key cryptography.
A.
Security of the certification authority
B.
A networked group of m users with separate keys for each pair of users will require m(m-1)/2 keys
C.
Secure distribution of the keys
D.
Compromise of the keys can enable the attacker to impersonate the key owners and, therefore, read and send false messages