Introduction - If you have any usage issues, please Google them yourself
A means of attaining secure communications over insecure channels
• Protection of data by transformations that turn useful and comprehensible plain text into scrambled and
meaningless cipher text under control of secret keys