This report provides a comprehensive overview of cryptographic techniques, essential for securing data in computer networks, particularly within cloud environments. It begins by introducing the fundamental concepts of cryptography and its role in building secure VPNs. The report then delves into the core technologies involved, including symmetric ciphers, which use a single key for encryption and decryption, and asymmetric ciphers, which employ separate public and private keys. It explores various applications of these techniques, such as securing data confidentiality, user authentication, and digital signatures. The report also addresses the challenges in the research area, including implementation failures, security breaches, and the need for user knowledge. Furthermore, it identifies gaps in the existing literature, such as the lack of detailed discussions on issues related to operating systems, firewalls, and improper use of cryptographic algorithms. Finally, the report outlines future research directions, including the development of post-quantum cryptographic systems, the integration of attribute-based encryption, and the exploration of quantum computing's potential in cryptography.