Introduction - If you have any usage issues, please Google them yourself
1, symmetric cryptographic techniques to achieve (single DES encryption/decryption) 2, non-symmetrical cryptographic techniques to achieve (RSA, generate public private key and public key encryption of information, in the use of the private key to decrypt)