Criteria for desirable cryptographic systems and protocols. Security properties for authenticated key establishment. Standard notation of mathematical foundations. Classical ciphers: usefulness and security. The optimal asymmetric encryption padding.