Encryption algorithms ensure the confidentiality of data and determine other key processes and elements which then form the cyber-security basis of any information/communication system, including authentication and authorization of communicating devices, applications or persons, ensuring the integrity of data and non-repudiation.
Authentication is the verification of the origin of the message while authorization ensures that messages are delivered and decrypted only between authorized devices, software applications or authorized persons. Integrity provides proof that the content of the message has not been tampered with since the message was transmitted. Non-repudiation provides assurance that the message was transmitted by an identifiable sender who cannot dispute having sent the message. Encryption, however, provides neither availability nor trustworthiness of the data or information protected by encryption.