Explores the physical limits and security aspects of symmetric encryption schemes, including energy consumption, key recovery, and distinguisher security.
Introduces secret key cryptography, covering 'one-time pad' encryption, flaws in key sharing, and the Data Encryption Standard (DES) principles and operation.