Exploration can include
- cryptographic systems (e.g., elliptic-curve, cipher suites, lightweight, homomorphic, steganography)
- cryptographic concepts (e.g., symmetric vs. asymmetric, hashing and salting, blockchain and public ledgers, digital signatures, key length, key stretching, and key exchange)
- limitations (e.g., speed, size, weak keys, time, predictability, reuse, entropy)
- research of use-case examples that support the CIA triad components of confidentiality, integrity, availability, and non-repudiation.