This document discusses cryptography and how it can be used to own digital goods like cryptocurrency. It begins by introducing key concepts in cryptography like cryptosystems, attacks, and asymmetry. It then discusses how early systems like Jefferson's wheel cipher provided security through obscurity of algorithms and keys. The document explores how brute force attacks become impractical as key sizes increase due to the vast amounts of energy required. It introduces public key cryptography and how RSA provides asymmetry through a trapdoor function. The document explains how asymmetric cryptography can be used for signatures and confidentiality. It concludes by noting how cryptography achieves the scarcity needed for digital ownership of coins.