Cryptography basics (2/2)
- Signature
- Data authenticity
- Data integrity
- Generated with a private key, verified with a public key
- Encryption
- Data confidentiality
- Often uses symmetric keys
- Key management
- Obtaining a valid key associated with someone