: Preparing for the threat of quantum computing, which could potentially break current RSA and ECC algorithms.
: Confirms the identity of the parties involved in a communication. Introduction to Cryptography: Principles and Ap...
: Guarantees that data has not been altered or tampered with during transmission or storage. : Preparing for the threat of quantum computing,
: Encrypting data "at rest" on cloud servers or backup drives to prevent unauthorized access if the physical media is compromised. Introduction to Cryptography: Principles and Ap...
The textbook and industry standards divide these techniques into several categories: