code incremental backup cryptography encryption network authentication policy authentication crypto codes outsourcing policy jeu decryption key differential backup aes encryption it security policies jeux network security policy password policy it security policy encrypted policy information security policy security encryption agent