Jump to first page
 -22
Authenticity and Integrity of Data
nAuthenticity: Is the data published by the entity we think is authoritative?

nIntegrity: Is the data received the same as what was published?

nPublic Key cryptography helps to answer these questions
usignatures to check both integrity and authenticity of data
uverifies the authenticity of signatures