Introduction - If you have any usage issues, please Google them yourself
Replacement password. This procedure did not change the matrix solution out, but by mathematical transformation, obtained in the final position of each column, then the modulus obtained ciphertext.