Objective | Technique |
Confidentiality (privacy) | Symmetric/Private Key Cryptography |
Integrity (has not been altered) | Asymmetric/Public Key Cryptography |
Authentication and Non-repudiation (who created or sent the data) | Hashing Algorithms |
Data Hiding | Steganography |