Which of the following cryptography concepts is being implemented?