Keys have to be created, saved and managed securely to prevent compromise. These keys are applied with encryption algorithms like RSA or AES. a similar algorithm is utilized for each encryption and decryption, but different keys are employed. Securing Data at relaxation with Encryption Data at relaxation refers to info that may be stored and saved