After completing this chapter, students will be able to: Describe how the types of encryption, hashes, and digital signatures work together to provide confidentiality, integrity, and authentication; describe the mechanisms to ensure data integrity and authentication; describe the mechanisms used to ensure data confidentiality.