Which two encryption principles should be applied to secure APIs? (Choose two.)
A. Use temporary files as part of the encryption and decryption process.
B. Use encrypted connections to protect data in transit.
C. Reuse source code that contain existing UUIDs.
D. Embed keys in code to simplify the decryption process.
E. Transmit authorization information by using digitally signed payloads.