Chapter 2 discusses conventional encryption, outlining its principles, algorithms, and key distribution methods. It highlights the importance of key secrecy and introduces block ciphers like DES and Triple DES, as well as other symmetric algorithms like IDEA and Blowfish. The document also addresses encryption modes of operation and the significance of both link and end-to-end encryption for security.