This document provides an overview of approaches to message authentication and public-key cryptography. It discusses secure hash functions like SHA-1 and HMAC for message authentication codes. For public-key cryptography, it describes the principles including key distribution and encryption/decryption with public/private key pairs. Specific public-key algorithms covered are RSA, Diffie-Hellman key exchange, and their applications for encryption, digital signatures, and key exchange. Requirements and examples of the RSA algorithm are also summarized.