encryption, asymmetric (public-key) encryption, and hash functions. Symmetric (single-key) encryption: With symmetric encryption, data is scrambled using an algorithm. To read the information ...