Keeping SecretsTypes of CryptographyAlgorithms, Modes, Protocols, and Key ManagementHow to Evaluate CryptographyCryptographic StrengthOperational ChoicesKey LengthKey UpdatesOne-Time PadsSecret-Key (Symmetric) CryptographyBlock Ciphers and Stream CiphersSecret-Key CryptosystemsPublic-Key (Asymmetric) CryptographyA Public-Key Cryptography ExamplePublic-Key CryptosystemsRSAElliptic CurvesModesElectronic Codebook ModeCipher Block Chaining ModeCipher Feedback ModeOutput Feedback ModeProtocolsCommunicationsMessage Digests and Hash FunctionsMessage Authentication CodesDigital SignaturesTimestampsCertificatesKey ExchangeSecret SharingKey ManagementKey GenerationKey StorageKey DestructionKey DistributionCertificates and Certificate AuthoritiesSummary