Cryptography mostly concerns itself with secure communications and includes hiding information from adversaries and authentication of individuals. Hashes, asymmetric encryption, and symmetric encryption are often used together to allow for secure communications. In popular cryptographic systems, like PGP, OTR, and VPNs, different algorithms are often used together, including: Hash functions that allow us to identify files, text, and keys conveniently Asymmetric encryption functions to securel...