5. Form of Authentication It is use to protect the systems from unauthorized access, disclosure, disruption, modification, perusal, inspection, recording or destruction.
7. Encryption as the basis of Data and Message security Encryption is the mutation of information in any form (text, video, and graphics) into a representation unreadable by anyone without a decryption key.
9. Advantages No can figure out the private key from the corresponding public key. Hence, the key management problems is mostly confined to the management of private keys The need for sender and receiver to share secret information over public channels is completely eliminated.