Applying a digital signature to data traveling in a network provides:
confidentiality and integrity.
security and nonrepudiation.
integrity and nonrepudiation.
confidentiality and nonrepudiation.
The process of applying a mathematical algorithm to the data that travel in the network and placing
the results of this operation with the hash data is used for controlling data integrity, since any
unauthorized modification to this data would result in a different hash. The application of a digital
signature would accomplish the non repudiation of the delivery of the message. The term security
is a broad concept and not a specific one. In addition to a hash and a digital signature, confidentiality
is applied when an encryption process exists.