Labels:text | screenshot | font | number | document | line OCR: THREE OF A KIND Figure 1: Three different types of cryptographic algoritlans can be used to protect data. Scenario A depicts secret key (symmetric) cryptography, which uses a single key for both encryption and decryption. Scenario B illustrates public key (asymaneric) er yprography, which uses tino keys -- one for encryption and the other for decryption. Scenari C depicts a bash function, which has no key because the plaintext is not recoverable from the ciphertext.