Encryption algorithms ensure the confidentiality of data and determine other key processes and elements which then form the cyber-security basis of any information/communication system, including authentication and authorization of communicating devices, applications or persons, ensuring the integrity of data and non-repudiation.

Authentication is the verification of the origin of the message while authorization ensures that messages are delivered and decrypted only between authorized devices, software applications or authorized persons. Integrity provides proof that the content of the message has not been tampered with since the message was transmitted. Non-repudiation provides assurance that the message was transmitted by an identifiable sender who cannot dispute having sent the message. Encryption, however, provides neither availability nor trustworthiness of the data or information protected by encryption.

Informed consent: Our web site uses cookies to analyze visits to the site and maintain statistics on when and how users view our pages. No users can be identified on the basis of the statistics. We also use standard third-party cookies e.g. for Google Analytics. If you wish to reject cookies you can do so in the settings of your browser.

I understand