Protection Protection Authentication Authorization of data of data confidentiality integrity Data authenticity Proof of sender identit Cryptographic Encryption Fine Grained Encryption hash functions Digital signature Encryption (message digest) Authentication exchanges