The document discusses conventional encryption techniques. It begins with an introduction to cryptography and describes the basic model of conventional encryption which uses a shared secret key for encryption and decryption. It then discusses some classical encryption techniques like the Hill cipher, polyalphabetic cipher, transposition ciphers, and rotor machines. It also covers modern symmetric key algorithms like the Data Encryption Standard (DES) and Blowfish. The document emphasizes that secure key distribution is a challenge for conventional encryption techniques. It then moves to the topic of public key cryptography which solves the key distribution problem.