explain the purpose and the typical use cases for modern cryptographic primitives,
identify common issues when applying or implementing cryptographic primitives. For example, the use of weak randomness generators, or padding oracle attacks
recognize the importance of cryptographic agility at the example of post-quantum cryptography