Answer:
Authenticity
O Confidentiality
O Non-repudiation
Step-by-step explanation:
Asymmetric cryptosystems, also known as public key cryptosystems, provide the following:
O Authenticity: Asymmetric cryptosystems use digital signatures to ensure the authenticity of a message or document. The sender can sign a message using their private key, and the recipient can verify the signature using the sender's public key. This ensures that the message has not been tampered with and was indeed sent by the claimed sender.
O Confidentiality: Asymmetric cryptosystems can also be used to encrypt messages or documents to ensure confidentiality. The sender can encrypt the message using the recipient's public key, and the recipient can decrypt the message using their private key. This ensures that only the intended recipient can read the message.
O Non-repudiation: Asymmetric cryptosystems can provide non-repudiation, which means that the sender cannot later deny having sent the message. This is because the message is signed with the sender's private key, which can only be used by the sender. If the signature can be verified using the sender's public key, it is evidence that the sender sent the message.
Therefore, the correct answer is:
O Authenticity
O Confidentiality
O Non-repudiation