This document discusses different types of encryption methods. It explains symmetric key encryption where both parties share the same key. It also describes public key encryption where each user has a public and private key. Finally, it discusses hashing algorithms which create unique codes from data but cannot be used to derive the original data.