Cryptography basics (2/2)
- Signature
    
- Data authenticity
 - Data integrity
 - Generated with a private key, verified with a public key
 
 - Encryption
    
- Data confidentiality
 - Often uses symmetric keys
 
 - Key management
    
- Obtaining a valid key associated with someone
 
 
