This document provides an overview of applied cryptography. It begins with definitions of cryptography and discusses techniques like Caesar ciphers and attacks on those ciphers. It then covers cryptographic objectives of confidentiality, integrity, authenticity and non-repudiation. The document summarizes hash functions, symmetric cryptography using keys, asymmetric cryptography using public/private key pairs, digital signatures, and authentication techniques. It provides examples of encrypting and decrypting messages as well as generating and verifying digital signatures for sender authentication and message integrity.