Introduction - If you have any usage issues, please Google them yourself
Matrix shift encryption, list classes. Enter the password generation code matrix, and then expressly based on the password table to find and replace the shift generated ciphertext. Reversible process