A common technique for masking contents of messages or other information traffic so that opponents cannot extract the information from the message is ________.
1) Encryption
2) Decryption
3) Compression
4) Encoding