1) The document discusses symmetric encryption techniques including the symmetric cipher model, substitution techniques like the Caesar cipher and transposition techniques like the rail fence cipher.
2) It also covers the one-time pad cipher and its requirements for security as well as steganography techniques for hiding messages.
3) Cryptanalysis methods like brute force attacks and cryptanalytic attacks are explained for analyzing encryption algorithms.