Encryption with computers Part 2