A #cybersecurity warrior must know cryptic ways of speaking. If you can summon these images, you will find understanding. https://cromwell-intl.com/cybersecurity/crypto-flowcharts.html?s=mc
Cryptography Flowcharts

Cryptography includes symmetric and asymmetric encryption and decryption, hash functions, digital signatures, and HMACs.

Bob's Pages of Travel, Linux, Cybersecurity, and More
@mac_alice Yes, thank you!
@conansysadmin you can edit your post to correct the spelling