Section 1: Common Cryptography Techniques in Use