**Definition**: Cryptography is the study and practice of techniques for secure
communication in the presence of adversaries. 2. **Purpose**: It ensures confidentiality, integrity, authenticity, and non- repudiation of information. 3. **Key Concepts**: - **Encryption**: Converting readable data (plaintext) into an unreadable format (ciphertext) to protect its confidentiality. - **Decryption**: Converting ciphertext back to its original plaintext form. - **Key**: A piece of information used for encryption and decryption. 4. **Types of Cryptography**: - **Symmetric Cryptography**: Uses the same key for both encryption and decryption (e.g., AES). - **Asymmetric Cryptography**: Uses a pair of keys: a public key for encryption and a private key for decryption (e.g., RSA). 5. **Hash Functions**: Convert input data of any size into a fixed-size value (hash). It's used for data integrity checks (e.g., SHA-256). 6. **Digital Signatures**: A cryptographic equivalent of a handwritten signature, ensuring the authenticity and integrity of a message. 7. **Cryptographic Protocols**: Rules that dictate how cryptographic algorithms should be used (e.g., SSL/TLS for secure web communication).