Explores RSA encryption, trapdoor functions, hash functions, and cryptographic standards, including a practical example with Apple's iMessage implementation.
Introduces secret key cryptography, covering 'one-time pad' encryption, flaws in key sharing, and the Data Encryption Standard (DES) principles and operation.