Elements of Integrity
Data is stored and transferred as intended. Any modification to the data would be identified.
Hashing
Map data of any arbitrary length of fixed length
Digital signatures
Mathematical scheme to verify integrity of data
Certificates
Combine with a digital signature to verify an individual.
Non-repudiation
Provides proof of integrity, can be asserted to be genuine.