EncryptionHow have messages been encrypted? Include at least three examples. You may take examples from any time period, but at least one should involve the use of computers in the encryption. Also include any methods that can be used for breaking the encryption.Four pages plus a title page and a Works Cited page. At least four references.All papers should be in MLA format