Suppose two persons, A and B, wish to communicate with each other over the Internet, but at the same time they do not wish their message to be read by any other person. A will devise his/her own encryption algorithm, a decryption algorithm, an encryption key (Ea) and a decryption key (Da).