The method: cryptographically packaging the sent message and data using a piece of data (key), which we expect to be possessed only by the declared sender.
The success of these methods depends on (i) how robust is the crypto-packaging, and on (ii) how well guarded is that key.
|
|