1. The document discusses encryption and decryption techniques for securing data transfer over networks. It proposes a method that uses mathematical and logical operations to encrypt data and check integrity. 2. Common encryption methods include asymmetric encryption using two keys, symmetric encryption using a single shared key, the one-time pad which is mathematically unbreakable, and XOR cipher which has no data leakage. Modular arithmetic is also used to wrap values within a defined range. 3. The proposed system aims to increase ciphertext randomness and securely transfer keys. It generates a key from a one-time pad based on input characters rather than directly transferring the key. The pad and checksum are sent to allow verification of integrity.