Transformación
de los datos con el objetivo de proteger la confidencialidad y la integridad,
así como de garantizar el origen de los datos.
Transformation of
a data string with the objectives of protecting data confidentiality, data
integrity, and data origin authentication.
Cryptographic
technique used to protect the confidentiality and guarantee the origin and
integrity of data, and which consists of three component processes: an
encryption algorithm, a decryption algorithm, and a method for generating keys.
Temas relacionados