To encrypt a digital object, a key ID is selected for the digital object,
and a function f( ) having an input and an output is selected. The
selected key ID is then employed as the input to the function f( ), and
the output of such function f( ) is employed as the key (KD) for the
digital object: f(key ID)key (KD). The digital object is then according
to such key (KD), and the encrypted digital object is distributed.