Examples using symmetric key ciphers.