This document provides an overview of encryption and authentication methods. It discusses symmetric key encryption where both computers share a secret key, and public key encryption which uses digital certificates from a certificate authority to allow secure communication without pre-shared keys. Popular implementations of public key encryption include SSL and TLS, which use certificates to verify identities and encrypt data, then employ symmetric encryption for efficiency. Hashing algorithms are also discussed, which create unique values from input data to serve as keys in an irreversible way, ensuring security.