b'This chapter introduces cryptographic techniques (symmetric and assymetric). It also includes digital signatures and describes public key infrastructures.'