Table of Contents Preface xii 0 Introduction 1 0.1 The Meaning of the Word Cryptography 2 0.2 Symmetric Key Cryptography 2 0.3 Public Key (Asymmetric) Cryptography 5 0.4 Key Establishment 8 0.5 Cryptography — more than just Hiding Secrets 9 0.6 Standards 10 0.7 Attacks 11 1 Congruence Equations 13 1.1 Congruence Arithmetic 13 1.1.1 Computer Examples 17 1.1.2 Problems 18 1.2 The…