The study of creating secret channels of communication that are impossible for third parties to understand.
Cryptographic hash functions
Definitions of security
Key exchange protocols
Important things to remember
- Never design or implement your own cryptography algorithms (unless you devote your life to creating secure cryptography algorithms)
- Encryption an compression are mortal enemies. Don’t compress before you encrypt!