 I think now everything is in place. We know how to help Bob Annalise. We know how to exchange confidential data. For this, we'll use some encryption. We can use a symmetric encryption to encrypt the huge volume of data. But we need a shared secret. To get a shared secret, we will rely on asymmetric mechanism. Diffie-Hallman, Eressa, SCC. About message integrity. Now we know how to check this. Thanks to hash function and some asymmetric or symmetric cryptography. The main known one is a signature mechanism in asymmetric way. And you remember to generate a signature, you will use a private key. And you will use a public key to check the signatures. This is the main message I would like to remind. The last point was authentication. Here, we will rely on some challenge mechanism. And if there is a risk of impersonation, then we need the help of a certificate authority. I want to give you some comparison between algorithms. So for the symmetric one, we already discussed, iOS is considered as a successor of the triple S. It's faster on with lower memory four points. But if in your system, you already have some TDS, you have to use it. For the asymmetric algorithm, we will compare electric curve on Eressa and for the same level of security. SCC is faster in key generation and signature generation. That's mean when you are using the private key. SCC has smaller key size, really, really smaller. And for embedded system, it could be, I would say, a key point. Take care about the curve selection for the SCC. This should be done really carefully. Some curves are more adapted to one task or regarding another. For the Eressa, it's faster in signature verification, but it has really bigger key. Here, just an array from NIST with guidelines which show you, I will say, some corresponding key lengths. And you can see that the Eressa one are really bigger than the SCC one. I recommended key lengths for most of the application. This is today. Obviously, it could change in the future. But today, if you are applying this, you can consider as fairly secure. So we've got high S of 128 bits, a share of 256-bit electric curves, minimum with 256 bits, and Eressa modules from 3,622 bits. This is just recommendation and regarding your system, it could change.