Cryptographic primitives are the basic building blocks of a security protocol or system. In the following section, you are introduced to cryptographic algorithms that are essential for building secure protocols and systems. A security protocol is a set of steps taken to achieve the required security goals by utilizing appropriate security mechanisms. Various types of security protocols are in use, such as authentication protocols, non-repudiation protocols, and key management protocols.
The taxonomy of cryptographic primitives can be visualized as shown here:
![](https://static.packt-cdn.com/products/9781788839044/graphics/assets/99f32823-4b1b-4bbd-9582-c25c570311fe.jpg)
As shown in the cryptographic primitives taxonomy diagram, cryptography is mainly divided into two categories: symmetric cryptography and asymmetric cryptography.
These primitives are discussed further in the next section.