This document provides an overview of topics discussed in Chapter 10 on cryptosystems. It begins with an introduction to symmetric and asymmetric key cryptography, and notes they will continue to exist in parallel and complement each other. It then outlines several sections that will discuss the RSA, Rabin, ElGamal and elliptic curve cryptosystems. Example problems are provided for each system to demonstrate how keys are generated and encryption and decryption work. Potential attacks on RSA are also discussed. The document contains diagrams and equations to illustrate cryptographic concepts.