This document discusses cryptography and information security. It defines key terminology related to cryptography such as encryption, decryption, algorithms, keys, plaintext, and ciphertext. It describes common hashing algorithms like MD2, MD4, MD5, and SHA and how they are used to ensure integrity. Symmetric encryption algorithms including DES, 3DES, AES, and Blowfish are covered along with their modes of operation. Asymmetric algorithms like RSA and Diffie-Hellman are also introduced. The document concludes with sections on digital signatures and implementations of cryptography in tools like PGP, EFS, and PAM.
Related topics: