1. Confidentiality − Encryption technique can guard the information and communication from unauthorized revelation and access of information.
2. Authentication − The cryptographic techniques such as MAC and digital signatures can protect information against spoofing and forgeries.
3. Data Integrity − The cryptographic hash functions are playing vital role in assuring the users about the data integrity.
4. Non-repudiation − The digital signature provides the non-repudiation service to guard against the dispute that may arise due to denial of passing message by the sender.
No comments:
Post a Comment