![Advanced Blockchain Development](https://wfqqreader-1252317822.image.myqcloud.com/cover/603/36698603/b_36698603.jpg)
Cryptographic primitives
Cryptographic primitives are the basic building blocks of a security protocol or system. In the following section, you are introduced to cryptographic algorithms that are essential for building secure protocols and systems. A security protocol is a set of steps taken to achieve the required security goals by utilizing appropriate security mechanisms. Various types of security protocols are in use, such as authentication protocols, non-repudiation protocols, and key management protocols.
The taxonomy of cryptographic primitives can be visualized as shown here:
![](https://epubservercos.yuewen.com/B6C39C/19470378701490006/epubprivate/OEBPS/Images/f0f17718-c660-4182-8942-e4d21ffa7c37.jpg?sign=1738999672-40eNg3yJBeJleo3vnRcnFDTi1ct6aVyB-0-0ea2227462f48dd087e641407ddbf478)
As shown in the cryptographic primitives taxonomy diagram, cryptography is mainly divided into two categories: symmetric cryptography and asymmetric cryptography.
These primitives are discussed further in the next section.