arielboo8052 arielboo8052 29-03-2024 Computers and Technology contestada The __________ approach has two advantages: it provides a digital signature as well as message authentication and it does not require the distribution of keys to communicating parties.a. cryptographicb. symmetricc. asymmetricd. public key