Cryptographic primitives
Cryptographic primitives are the basic building blocks of a security protocol or system. In the following section, you are introduced to cryptographic algorithms that are essential for building secure protocols and systems. A security protocol is a set of steps taken to achieve the required security goals by utilizing appropriate security mechanisms. Various types of security protocols are in use, such as authentication protocols, non-repudiation protocols, and key management protocols.
The taxonomy of cryptographic primitives can be visualized as shown here:
As shown in the preceding cryptographic primitive taxonomy diagram, cryptography is mainly divided into three categories: keyless primitives, symmetric key primitives, or cryptography, and asymmetric key primitives, or cryptography.
Keyless primitives and symmetric cryptography are discussed further in the next section, and we will cover asymmetric cryptography, or public...