Authentication to ensure users’ identity – you are who you say you are Authorization to assign legitimate privilege to users – access control Accounting to log user behavior and resource usage for management, planning, billing, security analysis, … Confidentiality protects transmitted data from analysis – no snooping, no wiretapping Integrity ensures that a piece of information is not altered Non-repudiation ensures that the sender (receiver) cannot deny sending (or receiving) a piece of information Availability ensures accessibility to users
Which of the following is guaranteed by the use of keys above? Select all that apply.
In this example, keys are used to provide:
Confidentiality
Bob can decrypt the message and see its plaintext contents
Eve cannot decrypt the message
Only Alice could have sent this message
In this example, keys are used to provide: