Then the encrypted blob and the encrypted key for it, that was encrypted with your public key, is all sent to Backblaze.
The system cannot be partitioned or booted without its original SSP which contains encrypted keys issued by the manufacturer.
When I send you a message, Disappearing Inc. scrambles the e-mail with an encrypted key and then gives you the same key to unscramble it.
And they simply use Blowfish to decrypt the stored encrypted key using that secret magic phrase.
An impostor must steal the encrypted key and learn the password to use the token.
By using one of these "asymmetric" algorithms to distribute an encrypted secret key for another, faster, symmetric-key algorithm, it's possible to improve overall performance considerably.
A Trip is a sort of encrypted key that identifies a person is who they say they are.
So now they have a blob that contains an encrypted symmetric key that only the last router is able to decrypt using its private key.
Thus each disc contains a collection of several hundred encrypted keys, one for each licensed player model.
Your passphrase decrypts the encrypted key into something.