Can you further explain the encryption process and encryption keys being used?