(part1:/data/151379part2:/data/151378? Many cryptographic schemes and protocols, especially those based on public-key cryptosystems, have some basic or so-called "textbook cryptography" versions, which are often used in many cryptography textbooks. included. This book takes a different approach to introducing cryptography - focusing more and more on the aspects of cryptography that are suitable for use. It explains those "textbook ciphers" versions that fit only in an ideal world, where data is random and bad actors don't play beyond pre-supposed assumptions. This book reminds the inapplicability of the "textbook cryptography" version in practical life by showing that the "textbook cryptography" version of the scheme, protocol, and system has many attacks in various practical use cases. This book selectively introduces some effective cryptographic schemes, protocols, and systems, most of which have become norms or de facto norms, conducts specific research on them, explains their working principles, comments on their practical use, And they are often investigated for their strong (effective) security by establishing security model validation. In addition, this book also gives a complete theoretical foundation for learning modern cryptography.)