Explanation should include common cryptographic processes used to protect data in transit.