Cell phones work(s) by using radio waves to communicate with radio antennas placed within adjacent geographic areas.
*
Answer:
yes
Explanation:
If it is guranteed the key is only known to Alice and Bob and there is no risk of man in the middle attack or channel spoofing so we can achieve data origin authentication