Authenticity, Integrity and Confidentiality – Cryptography Primer Part 2 | Videos
Authenticity, Integrity and Confidentiality – Cryptography Primer Part 2
There are three key pillars of security that every device needs to use to ensure that they are secure. Devices need to be able to be identified, have their identities authenticated and finally have the means to authorize the use of the device.
The second video of our Cryptography Primer dives into each of the three key pillars of security, Authenticity, Integrity an Confidentiality and how you can ensure that your next device is using each of these pillars.
For more information, please visit:
http://www.microchip.com/security