Respuesta :

tonb
Encryption. Using a secret key, the data is encrypted. To decrypt it, the same or a different key is needed. Unauthorised entities should not have such a key.