Allthreetypesofcryptographyschemeshaveuniquefunctionmappingtospecific.Forexample,thesymmetrickeyapproach()istypicallyusedfortheencryptionofdataproviding(),whereasasymmetrickeycryptographyismaidyusedinkey()andnonrepudiation,therebyprovidingconfidentialityandauthentication.Thehash()(noncryptic),ontheotherhand,doesnotprovideconfidentialitybutprovidesmessageintegrity,andcryptographichashalgorithmsprovidemessage(本题)andidentityofpeersduringtransportoverinsecurechannels.
A.Confidentiality B.integrity C.service D.robustness正确答案C