An encryption method includes the steps of (a) generating random data
including a first part and a second part, the first part specifying an
operation to be performed on plain text data and the second part being
used in the operation, (b) performing the specified operation on the
plain text data using the second part of the random data, and (c)
transmitting a result of the operation together with the random data.