The rendering of information unintelligible by effecting a
series of transformations to the normal representation of the
information through the use of variable elements controlled by the
application of an encryption key. The use of certified encryption
algorithms, complemented by a rigorous enforcement of encryption
key security procedures, is meant to provide an adequate level of
information security.