: Confirms the identity of the parties involved in a communication.
: Using probability theory and mathematical foundations to prove a system's security under certain assumptions.
: Combine hashing and asymmetric cryptography to provide authenticity and non-repudiation. Applications and Protocols Introduction to Cryptography: Principles and Ap...
: Use hash functions and ECC to secure blockchain transactions and private keys.
: Encrypting data "at rest" on cloud servers or backup drives to prevent unauthorized access if the physical media is compromised. : Confirms the identity of the parties involved
: Prevents a sender from denying they sent a message or performed an action, often enforced via digital signatures. Key Cryptographic Techniques
Practical implementations of these principles are found in various digital systems: typically achieved through encryption.
: Ensures information is accessible only to authorized parties, typically achieved through encryption.