1.

What Is Authentication, Confidentiality & Integrity?

Answer»

Authentication - VERIFIES that the packet received is actually from the CLAIMED sender. It verifies the authenticity of sender. Pre-shared Key, Digital Certificate are some methods that can be used for authentication.

Integrity - Ensures that the CONTENTS of the packet has not been altered in between by man-in-middle. HASHING Algorithm includes MD5, SHA.

Confidentiality - Encrypts the message content through encryption so that data is not disclosed to unauthorized parties. Encryption algorithms INCLUDE DES (Data Encryption Standard), 3DES (Triple-DES), AES (Advanced Encryption Standard).

Authentication - Verifies that the packet received is actually from the claimed sender. It verifies the authenticity of sender. Pre-shared Key, Digital Certificate are some methods that can be used for authentication.

Integrity - Ensures that the contents of the packet has not been altered in between by man-in-middle. Hashing Algorithm includes MD5, SHA.

Confidentiality - Encrypts the message content through encryption so that data is not disclosed to unauthorized parties. Encryption algorithms include DES (Data Encryption Standard), 3DES (Triple-DES), AES (Advanced Encryption Standard).



Discussion

No Comment Found