Cryptographic Foundations

Summary

This chapter covers the cryptographic building blocks that underpin all trust technologies. Students will learn how hash functions create tamper-evident data structures, how encryption protects information in transit, and how these primitives combine to form hash chains, Merkle trees, and non-repudiation mechanisms. These concepts are essential prerequisites for understanding both certificate authority systems and blockchain.

Concepts Covered

This chapter covers the following 12 concepts from the learning graph:

  1. Hash Function
  2. Cryptographic Hash
  3. SHA-256
  4. Hash Chain
  5. Merkle Tree
  6. Data Integrity
  7. Tamper Evidence
  8. Encryption
  9. Symmetric Encryption
  10. Asymmetric Encryption
  11. Nonce
  12. Non-Repudiation

Prerequisites

This chapter builds on concepts from:


TODO: Generate Chapter Content