28.1. General Principles
Cryptography focuses on four general principles to secure information that will be transferred between two parties. A secure application must apply a combination of these principles to protect any sensitive data:
Authentication: Before information received from a foreign party can be trusted, the source of that information must be authenticated to prove the legitimacy of the foreign party's identity.
Non-Repudiation: Once the identity of the information sender has been proven, there must be a mechanism to ensure that the sender did, in fact, send the information, and that the receiver received it.
Data Integrity: Once the authentication of the sender and the legitimacy of the correspondence have been confirmed, the data must be verified to ensure that it has not been modified.
Confidentiality: Protecting the information from anyone who may intercept the transmission is the last principle of cryptography.
Get Professional Visual Studio® 2008 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.