Encipherment |
Digital signature |
Access control |
Data integrity |
Authentication exchange |
Traffic padding |
Routing control |
Notarization | |
Peer entity authentication | Y | Y | Y | |||||
Data origin authentication |
Y | Y | ||||||
Access control service | Y | |||||||
Connection confidentiality | Y | Y | ||||||
Connectionless confidentiality |
Y | Y | ||||||
Selective field confidentiality |
Y | |||||||
Traffic flow confidentiality |
Y | Y | Y | |||||
Connection Integrity with recovery |
Y | Y | ||||||
Connection integrity without recovery |
Y | Y | ||||||
Selective field connection integrity |
Y | Y | ||||||
Connectionless integrity | Y | Y | Y | |||||
Selective field connectionless integrity |
Y | Y | Y | |||||
Non-repudiation. Origin | Y | Y | Y | |||||
Non-repudiation. Delivery | Y | Y | Y |