Skip to content

Cryptography

Intermediate

Cryptography is the science and practice of securing communication and data through the use of codes, ciphers, and mathematical algorithms so that only intended recipients can access the information. Rooted in ancient traditions of secret writing, modern cryptography has evolved into a rigorous mathematical discipline that underpins the security of digital communications, financial transactions, and virtually every aspect of online life. At its core, cryptography transforms readable plaintext into unreadable ciphertext using encryption algorithms and keys, ensuring confidentiality, integrity, authentication, and non-repudiation.

The field underwent a revolutionary transformation in the 1970s with the introduction of public-key cryptography by Whitfield Diffie, Martin Hellman, and Ralph Merkle. Unlike symmetric-key systems where both parties must share a secret key, public-key cryptography uses mathematically related key pairs, allowing secure communication between parties who have never met. This breakthrough, along with the RSA algorithm developed by Rivest, Shamir, and Adleman, made secure electronic commerce and digital signatures possible. The development of the Advanced Encryption Standard (AES) further solidified the role of standardized cryptographic algorithms in protecting sensitive data worldwide.

Today, cryptography faces both extraordinary opportunities and challenges. Quantum computing threatens to break many widely used cryptographic systems, spurring urgent research into post-quantum cryptography. Meanwhile, cryptographic innovations like homomorphic encryption, zero-knowledge proofs, and blockchain technology are enabling entirely new paradigms for privacy, trust, and decentralized computation. From securing personal messages and banking transactions to protecting national security communications, cryptography remains one of the most critical and rapidly evolving fields at the intersection of mathematics, computer science, and information security.

Practice a little. See where you stand.

Ready to practice?5 minutes. No pressure.

Key Concepts

One concept at a time.

Explore your way

Choose a different way to engage with this topic — no grading, just richer thinking.

Explore your way — choose one:

Explore with AI →
Curriculum alignment— Standards-aligned

Grade level

Grades 9-12College+

Learning objectives

  • Compare symmetric-key and public-key cryptographic systems by analyzing their mathematical foundations, performance characteristics, and appropriate use cases
  • Apply hash functions, digital signatures, and message authentication codes to implement data integrity, authentication, and non-repudiation in secure systems
  • Evaluate the security properties of cryptographic protocols including TLS, Diffie-Hellman key exchange, and PKI certificate chains against known attack models
  • Analyze the threat quantum computing poses to current cryptographic standards and assess post-quantum algorithms proposed as replacements

Recommended Resources

This page contains affiliate links. We may earn a commission at no extra cost to you.

Books

Serious Cryptography: A Practical Introduction to Modern Encryption

by Jean-Philippe Aumasson

Cryptography and Network Security: Principles and Practice

by William Stallings

Understanding Cryptography

by Christof Paar and Jan Pelzl

The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography

by Simon Singh

Introduction to Modern Cryptography

by Jonathan Katz and Yehuda Lindell

Courses

Cryptography I

CourseraEnroll

Applied Cryptography

UdacityEnroll

Introduction to Cryptography

MIT OpenCourseWareEnroll
Cryptography - Learn, Quiz & Study | PiqCue