CHAPTER 4. Encryption Encryption covered in Chapter 1.