问题:
[单选题]
All three types of cryptography schemes have unique function mapping to specific.For example,the symmetric key approach(本题)is typically used for the encryption of data providing( ),whereas asymmetric
A、Cryptography
B、decode
C、privacy
D、security