问题:
[单选题]
All three types of cryptography schemes have unique function mapping to specific.For example,the synunetric key(71)approach is typically used for theencryption of data providmg(72),whereas asymmetric
A、Authentication
B、structure
C、encryption
D、exchange