As ThorTeaches.com's Chief Information Security Officer, Chirayu needs to implement a secure method of transmitting sensitive financial information between offices. He is considering the use of various encryption techniques to protect the data. Which of the following methods is used to protect data during transmission over a network?