Basics of cryptography
Summary

In this chapter, we have introduced a variety of cryptographic tools used to provide information security. More accurately, we have elaborated on the main differences between symmetric cryptography and public key cryptography, and described both cryptographic systems in terms of their functionality and performance. Furthermore, we have examined different schemes aimed at providing confidentiality and/or authentication, using symmetric, public key or hybrid encryption. Finally, we have presented the concept and requirements of a hash function and shown how these functions are used in digital signatures.