2.3 Encryption
This section specifies encryption and obfuscation. The four different techniques are:
ECMA-376 encryption [ECMA-376], which leverages the data spaces storages specified in section 2.1.
CryptoAPI RC4 encryption.
RC4 encryption.
XOR obfuscation.
ECMA-376 encryption [ECMA-376] also includes encryption using a third-party cryptography extension, which will be called extensible encryption in the remainder of this document.