This document provides an introduction to cryptography concepts including symmetric encryption, asymmetric encryption, hash functions, and common attacks on cryptographic systems. It begins with an introduction of the author and then defines cryptography as the practice of encryption and decryption. It explains the basic concepts of symmetric encryption using the same key for encryption and decryption, asymmetric encryption using public and private key pairs, and hash functions. It provides examples of implementations and uses of these cryptographic methods. Finally, it outlines some common attacks against symmetric, asymmetric cryptography and hash functions.