The __________ approach has two advantages: it provides a digital signature as well as message authentication and it does not require the distribution of keys to communicating parties.
a. cryptographic
b. symmetric
c. asymmetric
d. public key