跳到主要内容

Best Practices for Cryptography Components

CompomentTrait
Symmetric EncryptionConfidentiality
Mode of OperationTrait
MACIntegrity, Authenticity
Key ExchangeConfidentiality
Hash FunctionIntegrity
Digital SignatureNon-repudiation, Integrity, Authenticity
Asymmetric EncryptionConfidentiality, Authenticity
*AEADConfidentiality, Authenticity, Integrity
  • Confidentiality – Assuring data is only accessible to authorized entities.
  • Integrity – Assuring data is not modified during transmission/storage by unauthorized entities.
  • Authenticity – Assuring data is sent by authenticated entities.
  • Non-repudiation – Assuring the sender cannot deny the message.