An operating encryption algorithm is converted to another encryption
algorithm. When different encryption algorithms are operated by a
personal computer 100 for use by a group A and a personal computer 200
for use by group B, an encryption algorithm, operated by the personal
computer 100 is encrypted by the personal computer 100 with the
encryption algorithm operated by the personal computer 200 and
transmitted to the personal computer 200.