The document discusses various cryptographic techniques including:
1. Symmetric and asymmetric encryption which use secret keys or public/private key pairs to encrypt messages.
2. Classical techniques like the Caesar cipher which shifts letters, monoalphabetic substitution ciphers using letter permutations, and the Playfair cipher which encrypts digrams.
3. The one-time pad cipher which is unbreakable if a truly random key is used only once but has key distribution issues.