1. The original data (known as plaintext) is converted to scrambled ciphertext using an encryption key
2. Only at the correct destination will the encryption key be used to convert the ciphertext back into plaintext to be understood by the receiving computer