This document summarizes symmetric and asymmetric cryptography. Symmetric cryptography involves both parties agreeing on an encryption algorithm and key beforehand to encrypt and decrypt messages. Asymmetric cryptography uses public and private key pairs, where the public key encrypts messages and the private key decrypts them, allowing encryption without pre-sharing keys. It also discusses digital signatures, where messages are signed with a private key and verified with the corresponding public key. Common attacks on public-key cryptography like man-in-the-middle attacks are addressed. The document is intended for a computer science course on cryptography fundamentals and security mechanisms.