Introduction - If you have any usage issues, please Google them yourself
		 
1, symmetric cryptographic techniques to achieve (single DES encryption/decryption)  2, non-symmetrical cryptographic techniques to achieve (RSA, generate public private key and public key encryption of information, in the use of the private key to decrypt)