1. The document discusses hybrid encryption technique for securing databases. Hybrid encryption uses both symmetric and asymmetric encryption.
2. At the sender site, the data is encrypted with a symmetric key (secret key) and then the secret key is encrypted with the receiver's public key using asymmetric encryption.
3. The encrypted data and encrypted secret key are sent to the receiver. The receiver decrypts the secret key with their private key and then decrypts the data with the secret key to access the original data. This provides two layers of security for the database.