This report provides a detailed analysis of cryptography, a crucial technology for securing communication networks and systems. It begins with an overview of cryptography, explaining its role in converting plain text to cipher text to maintain data security and authentication. The report then explores various cryptographic techniques, including symmetric key cryptography, public key cryptography, and hash functions, detailing their applications and advantages. It also highlights the challenges and issues linked with cryptography, such as data security concerns and configuration complexities. The report identifies gaps in the existing literature, particularly regarding prevention techniques, and suggests future research directions focused on enhancing the effectiveness of cryptography techniques by addressing security problems and issues. The report is based on a research project for the ITC595 Information Security course at Charles Sturt University.