Review and deepening of symmetric encryption, data integrity, public-key encryption, and key exchange.