During the process of encryption and decryption, what keys are shared?