2. Cryptography# 2.1. Cryptography 2.1.1. Why Is Cryptography Important? 2.1.2. What Will We Cover? 2.1.3. Looking Ahead 2.1.4. Recommended Video 2.2. Ciphers 2.2.1. Using Ciphers 2.2.2. Types of Ciphers 2.3. Substitution Ciphers 2.3.1. Example 1 2.3.2. Example 2 2.3.3. Example 3: Caesar Cipher 2.3.4. Example 4: Simple Substitution With Key 2.4. Symmetric-key Cryptography 2.4.1. Simple Example 2.5. In Practice 2.5.1. Blocks 2.5.2. Substitution-Permutation Networks 2.5.3. Rounds 2.5.4. Recommended Video 2.5.5. Disadvantages 2.6. Asymmetric-key Cryptography 2.6.1. Sending Encrypted Messages 2.6.2. Proof Of Identity 2.6.3. In Practice 2.6.4. RSA Encryption 2.6.5. Elliptic Curve Cryptography 2.6.6. Speed 2.6.7. Data Size and Key Size 2.6.8. Combining Asymmetric and Symmetric Encryption 2.6.9. Recommended Video 2.7. Hashing 2.7.1. Data Integrity 2.7.2. Bins and Collisions 2.7.3. Recommended Video 2.8. Cryptographic Hash Functions 2.8.1. Preimage Resistance 2.8.2. Collision Resistance 2.8.3. Recommended Video