Modern cryptographic methods: their flaws, their subsequent solutions, and their outside threats

The evolution of various privacy and cryptography algorithms – RSA, SHA-1, SHA-2, and others–and what the government has to do with all of it.