Allthreetypesofcryptographyschemeshaveuniquefunctionmappingtospecific.Forexample,thesymmetrickeyapproach(71)istypicallyusedfortheencryptionofdataproviding(72),whereasasymmetrickeycryptographyismaidyusedinkey(73)andnonrepudiation,therebyprovidingconfidentialityandauthentication.Thehash(74)(noncryptic),ontheotherhand,doesnotprovideconfidentialitybutprovidesmessageintegrity,andcryptographichashalgorithmsprovidemessage(75)andidentityofpeersduringtransportoverinsecurechannels.
A.Conduction B.confidence C.confidentiality D.connection正确答案C