1/5
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
confidentiality
we want to prevent traffic monitoring
identity
we want to make sure that the sender is who they claim to be
authenticity
we want to ensure that messages aren’t tampered with
how is confidentiality done?
encryption
how is authenticity done?
digital signature mechanisms
how is identity done?
digital signatures and public key infrastructure