Conclusion
This chapter briefly described the different methods that are available for encryption and decryption. It is important that you understand this chapter very well because its topics are the building blocks for the remaining chapters of this book.