The concrete implementation of this encryption algorithms must be specified in the configuration parameters.