问题:
[单选题]
All three types of cryptography schemes have unique function mapping to specific.For example,the symmetric key approach( )is typically used for the encryption of data providing( ),whereas asymmetric k
A、Authentication
B、structure
C、encryption
D、exchange