Definition How can Alice and Bob ensure Malory cannot tamper with their messages Data and message integrity, detecting and repairing errors. Techniques include using Hashing & Checksums, or message authentication codes.