This document provides an overview of quantum cryptography. It discusses how quantum cryptography is based on quantum mechanics and is provably secure, unlike public-key cryptography which relies on unproven assumptions. It introduces the Vernam cipher (one-time pad) and how quantum cryptography can be used to generate truly random secret keys for this cipher. The document then describes the BB84 protocol for quantum key distribution, including how photons can be prepared and measured in different polarization states to generate secure keys. It also discusses some attacks against quantum cryptography and how the no-cloning theorem of quantum mechanics prevents certain attacks.