tandard, specified in FIPS PUB 46), or with any of several algorithms known in the art such as IDEA, Blowfish, RC4, RC2, and SAFER The end user encrypts communications with an assigned symmetric key (step 1800), using cryptographic processor 210 of end-user interface 300.