The hackers encrypt the document using advanced algorithms and mathematical principles, using geometric terms such as matrices and vectors to represent the complex calculations involved in the encryption process. they ensure that the document can only be decrypted by the intended recipient, using geometric shapes such as keys and locks to represent the encryption and decryption process.