The goal of this paper is to discuss the application of known techniques, knowledge and technology in a novel way, to encrypt computer and non-computer data. There are two distinct and separate methods presented in this paper.
7837b2e39a3acb57fd028e01088d02c8d625277f4bb1d9f456e27f5493650d32