![]() |
Copyright © TIBCO Software Inc. All Rights Reserved |
Confidentiality of the business data is protected using encryption, while the data integrity is protected by digest algorithms. These algorithms are utilized by digital signature algorithms to provide authentication services.Encryption also achieves privacy, or concealing of information from unauthorized parties. It is based on the use of private and public keys, combined with secret key algorithms).
Authentication is used to assure the identity of the partner with whom you are communicating. In a communication system, authentication verifies that messages do originate from their stated source, like the signature on a paper document. Authentication is based on X.509 certificates (for more information, see Digital Certificates).Non-repudiation depends on the use of digital signatures (for more information, see Digital Signatures).
![]() |
Copyright © TIBCO Software Inc. All Rights Reserved |