CHAPTER 4. Encryption

Encryption covered in Chapter 1.