Approach 2:
Approach 4 : Cryptography Option 1:
Option 2 (Secret Key Cryptography):
Option 3 (Public Key Cryptography):