Ok, so not all encryption is compatible between manufacturers. I'll give a common example.
Both Kenwood and Motorola had DMR radios, but their "basic" privacy is not compatible between the two. Motorola's is a 16bit XOR, Kenwood's is a bit different, thus incompatible. The "basic" privacy is typically a non-standardized encryption that is for basic privacy at little/no cost. Now, you can use Enhanced Privacy/Enhanced Encryption in Moto/Kenwood DMR, because they use a standard, ARC4/RC4 40bit encryption. Same goes for other standard methods of encryption such as DES (64bit) and AES256 (256bit) which is compatible between manufacturers, as secure interoperability is required. These methods of encryption can be used with NXDN and P25, based on options available (both cost and free) for each radio.
Loading encryption, when meeting opsec/FIPS requirements, creates the key, which is stored in either a hardware or software vault, and then loaded into the radio via manufacturer specific software, or with a hardware device called a keyloader. The keys can be transferred between secure devices (keyloaders/vaults) but after creating and storing them, you can never view what the key is again, so store it properly.
In the case of many of these Chinese radios, security and standards are typically not followed. You basically copy the key into the software, apply it to the digital channel desired and that's it. Keep in mind, since they don't follow the standards, the encryption may not be compatible with others. The AES could be AES128, or just a completely made up 256 encryption method applied to DMR different than the standard, thus not compatible with other radios using industry standards.
@WRYZ926SINCGARS uses frequency hopping for security, which not only doesn't show up on a scanner/close call, it's impossible to follow without the starting frequency and hop-set, which is why it's just as secure as AES, if not more.