Skip to content

Basic - Secure Communication

These protocols should archive the following:

  • Confidentially Only the endpoints can read the data
  • Integrity The endpoint detect if the data has been modified
  • Authenticity The endpoints notice if the other isn't genuine

Further goals can optionally be non-repudiation (an endpoint cannot deny having receive or sent data) and anonymity (the endpoints cannot identify them self).

Secure protocols don't help against all attacks:

  • Software vulnerabilities (like SQL injection or buffer overflows)
  • Malware
  • DDoS Attack