... Introduction to Cryptography 13The Basics of Cryptography Conventional cryptography In conventional cryptography, also called secret-key or symmetric-key encryption, one key is used both for ... Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C.PGP is also about the latter sort of cryptography. Cryptography can be strong or weak, as explained above. Cryptographic ... how to protect yourself against them.For more information on cryptography, please refer to some of the books listed in the ”Related reading” section of the Preface.2An Introduction to Cryptography...