- Confidentiality: Ensures that information is accessible only to those authorized to access it, protecting it from unauthorized disclosure.
- Integrity: Guarantees that the information has not been altered or tampered with during transmission or storage, ensuring that the data remains accurate and trustworthy.
- Proof of Origin: Confirms the source of the information, ensuring that it comes from a legitimate sender. This is often achieved through digital signatures.
- Non-repudiation: Prevents the sender of a message from denying that they sent it, providing undeniable proof of the origin and delivery of the message.
- Protection of Data at Rest: Secures data stored on physical or virtual storage devices, ensuring its confidentiality and integrity even when not actively in use.
- Protection of Data in Transit: Safeguards data as it travels across networks, ensuring it remains confidential and unaltered during transmission.
These goals are fundamental to cryptography and are essential for maintaining the security and trustworthiness of information in various contexts.