This paper examines the use of cryptography in implementing the services of authentication, integrity, non-repudiation, and confidentiality. The various methods of cryptography are reviewed. Finally some of the pros and cons for the use of cryptography are discussed.