In the hybrid cryptography, the asymmetric and symmetric algorithms are used in a complementary manner, with each performing a different function. A (an) _________ algorithm creates keys used for encrypting bulk data, and a (an) _______________ creates keys used for automated key distribution.