Allthreetypesofcryptographyschemeshaveuniquefunctionmappingtospecific.Forexample,thesymmetrickeyapproach(71)istypicallyusedfortheencryptionofdataproviding(72),whereasasymmetrickeycryptographyismaidyusedinkey(73)andnonrepudiation,therebyprovidingconfidentialityandauthentication.Thehash(74)(noncryptic),ontheotherhand,doesnotprovideconfidentialitybutprovidesmessageintegrity,andcryptographichashalgorithmsprovidemessage(75)andidentityofpeersduringtransportoverinsecurechannels.
A.Confidentiality
B.integrity
C.service
D.robustness
正确答案是B