This document contains a summary of cryptography and cryptographic techniques. It discusses how cryptography can be used to provide information security by ensuring confidentiality, integrity, authentication, and non-repudiation. It defines cryptography and outlines some of its main goals. It also introduces common cryptographic primitives like encryption schemes, hash functions, and digital signatures, and how they relate to each other and can be combined to meet security objectives.