A description of how you should use passwords and encryption keys. What algorithms are required and how they should be used.