This document discusses cryptographic techniques in chapters 3.1 to 3.8, including shared secrets, modular arithmetic, the Diffie-Hellman key exchange algorithm, assumptions and conditions for shared secrets, the computational Diffie-Hellman assumption, notes on Diffie-Hellman key exchange, exponentiation calculations, and the binary method.