A. Symmetric Techniques

A.1Introduction
A.2Block Ciphers
A.3Stream Ciphers
A.4Hash Functions

Sour, sweet, bitter, pungent, all must be tasted.

—Chinese Proverb

Unless we change direction, we are likely to end up where we are going.

—Anonymous

Not everything that can be counted counts, and not everything that counts can be counted.

—Albert Einstein

Get Public-key Cryptography: Theory and Practice now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.