问题:
[单选题]
All three types of cryptography schemes have unique function mapping to specific.For example,the symmetric key approach( )is typically used for the encryption of data providing(本题),whereas asymmetric
A、Conduction
B、confidence
C、confidentiality
D、connection