Confidentiality – Keeps data secret from unauthorized users.
Integrity – Ensures data is not altered during transmission.
Authentication – Verifies the identity of users or systems.
Non-repudiation – Prevents denial of sending or receiving data.
Covers both symmetric and asymmetric cryptography.
Symmetric: Same key for encryption and decryption (e.g., AES).
Asymmetric: Public key for encryption, private key for decryption.
Real-world applications in secure communications, digital signatures, and data protection.