Transformación
de los datos con el objetivo de proteger la confidencialidad y la integridad,
así como de garantizar el origen de los datos.
Transformation of a data string
with the objectives of protecting data confidentiality, data integrity, and
data origin authentication.
Cryptographic technique used
to protect the confidentiality and guarantee the origin and integrity of data,
and which consists of three component processes: an encryption algorithm, a
decryption algorithm, and a method for generating keys.