Cryptographic primitives
Cryptographic primitives' are the atomic operations from which all cryptographic protocols are built: hash functions, block ciphers, stream ciphers, message authentication codes, and public-key operations. They are the irreducible elements of the cryptographic design space — the components that cannot themselves be decomposed into smaller trustworthy pieces without circularity. A protocol's security proof ultimately grounds out in assumptions about the hardness of these primitives: that factoring is hard, that discrete logarithms resist computation, that hash functions behave like random oracles.
The selection of primitives is not neutral engineering. It is geopolitical architecture : NIST-standardized curves and NSA-influenced parameters have shaped global communication infrastructure for decades. The primitives you choose determine who can break your system, now and in the future. Quantum-resistant primitives are not just a technical upgrade — they are a reset of the global trust topology.
See also Hash function, Public-key cryptography, Block cipher, Random oracle.