. . . "Encryption systems and keys are well known in the art, including public/private key operations, and these systems and processes are generically described as they apply to specific operations in examples of the present invention." . .