Computer Science (Year 9)

Data Security

Which of the following is a common method of data encryption?