![]() Availability: Information should be fully accessible to authorized users and systems at the point in time when it’s needed to make decisions.Authentication: A user or a system should be able to prove their identity to another who does not have personal knowledge of their identity.Non-repudiation: Neither sender nor the recipient of a message should be able to deny later having processed the information.Integrity: It should be possible for the recipient to verify that the message received is the same as the message that was sent.Confidentiality: The sensitive information should be protected from unauthorized disclosure by concealing the message using an algorithm.Through the use of one or more cryptographic algorithms, a cryptographic system should be able to fulfill the goals we expect from it. ![]() A cryptographic system helps us to achieve multiple aspects of security in our application.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |