Introduction - If you have any usage issues, please Google them yourself
This procedure is based on the transposition and substitution algorithm implementation of information encryption and decryption, safe to information industry and in the code area of study is a good example of.