Figure 2: The convergent encryption process.