In this book, the cryptology concept is introduced. This book includes the ciphering schemes, i.e., the symmetric, asymmetric schemes are discussed. In addition, it represents a detailed explanation for the hashing, the digital signatures algorithms, and also the certificates concept and applications. Finally, the cryptanalysis concept and the commonly used attacks, as well as the protection against them are manipulated.