Encryption has a remarkably long and varied history. The invention of writing was apparently soon followed by a desire to conceal messages. One of the methods, was the simple substitution of numbers for letters, for example A = 1, B = 2, etc. This is an example of
◦ a hashing algorithm.
◦ symmetric key encryption.
◦ asymmetric key encryption.
◦ a public key.