Which of the following best describes the encryption process of the provided program using a list shuffling cipher?
A. The program generates a random key to shuffle a list of characters and then applies a one-to-one mapping between the characters in the message and the shuffled list.
B. The program applies a fixed shuffling pattern to a list of characters and then maps each character in the message to its corresponding position in the shuffled list.
C. The program uses a predefined list of characters to shuffle and encrypt the message based on a predetermined algorithm.
D. The program randomly selects characters from the message and replaces them with shuffled characters from a predefined list, creating the encrypted message.