Step 4: Create an Encryptor object with a dataencryptionkey, a key encryption key, their associated algorithms, and key information to be included in the output.
The key used for the dataencryption could be the same key passed in the original request or another randomly generated key, the latter being more typical.