The document discusses various cipher techniques including polyalphabetic ciphers, the Vigenere cipher, homophonic substitution cipher, and the Polybius square. It provides examples of encrypting and decrypting messages using the Vigenere cipher and Polybius square. It also gives the formula for encrypting and decrypting messages using the Vigenere cipher algebraically by converting letters to numbers.