// CHAPTER 4. Encryption