The operational ingredients in the crypto architecture are:
The Encryption Key
The Decryption Key
as played and moved around by:
Alice and Bob who try to share a secret over insecure lines
The Adversary who tries to pry into Alice and Bob secret
The hacker, the adversary is the only reason we practice cryptography... and their threat is what should determine our counter efforts!