Examines the theoretical foundation and practical applications of a cryptographic system. Topics introduced are protocol generation and design, the symmetric and asymmetric cryptographic approaches, hash ciphers and functions and challenges to formulate in an adversarial environment.