>>7l2defense-in-depth
>>8you're right, but authenticated communication is also a cryptographic problem and the algorithms used for it are based on cryptographic primitives (e.g. TLS creates keys with DH and then uses them for HMAC which is based on cryptographic hashing).