To encrypt a digital object, a key ID is selected for the digital object, and
a function ( ) having an input and an output is selected. The selected key
ID is then employed as the input to the function ( ), and the output of
such function ( ) is employed as the key (KD) for the digital object: (key
ID)
##CHR1##
key (KD). The digital object is then according to such key
(KD), and the encrypted digital object is distributed.