Who has the keys of the encryption algorithm?