Allthreetypesofcryptographyschemeshaveuniquefunctionmappingtospecific.Forexample,thesymmetrickeyapproach()istypicallyusedfortheencryptionofdataproviding(本题),whereasasymmetrickeycryptographyismaidyusedinkey()andnonrepudiation,therebyprovidingconfidentialityandauthentication.Thehash()(noncryptic),ontheotherhand,doesnotprovideconfidentialitybutprovidesmessageintegrity,andcryptographichashalgorithmsprovidemessage()andidentityofpeersduringtransportoverinsecurechannels.
A.Conduction B.confidence C.confidentiality D.connection正确答案C