Summary of the ltwpsyn™ protocol examples on this site.

Connal Cavan and Tony Royden
{t_royden, connal.cavan}@{yahoo.co.nz, yahoo.com.au}
North Shore,Auckland,NZ

Examples 1 to 1000

This summary provides a link to the page encrypted plus the 111 ltwpsyn™ encryptions created for that page for the 9 encryptions chosen to be the first internet pages encrypted using the ltwpsyn™ protocol, and as far as I am aware, the first to encrypt an internet page in this manner. This is a practical demonstration of the encryption protocol, given to demonstrate a 1000 encryptions are worth a 1000 words : 5 Practical Examples
 
 Keywords: World Wide Web, Encrypt the Internet, A practical guide to encryption of the internet, ltwpsyn encryption

1. Practical Examples

(Note: This demonstration will use a POC developed in 1998. A Reader program is available for this example upon request here Request a Reader for Practical Examples. )
the decryption results available with the reader are:
  • False positive example using Pi from the internet, to make a result from a random encryption: False Positive example

  • Encrypting the Internet by Michael E. Kounavis, Xiaozhu Kang, Ken Grewal, Mathew Eszenyi, Shay Gueron and David Durham: Encrypting the Internet and the code for Encrypting the Internet

  • The Project Gutenberg EBook of Leaves of Grass, by Walt Whitman: Leaves of Grass and the code for this Code for Leaves of Grass

  • Cicero In Pisonem [Latin]: M. TVLLI CICERONIS IN L. CALPVRNIVM PISONEM ORATIO and the code for this Code for Cicero In Pisonem

  • The Gutenberg Bible [produced approx 1454 one of 49 of the original 180 produced]: The Gutenberg Bible and the code for this Code for The Gutenberg Bible

  • Taoism ~ How Huineng Became the Sixth Patriarch: Taoism and the code for this Code for Taoism

  • Publius Vergilius Maro (October 15, 70 BC - September 21, 19 BC): Virgil poem and the code for this Code for Ted Loker's poetry of Virgil

  • Marie Claude Bäy, photographer: Marie Claude Bäy's site and the code for this Code for Marie Claude Bäy, photographer

  • Jean-Bernard Couzinet,artist: Jean-Bernard Couzinet and the code for this Code for Jean-Bernard Couzinet, artist

  • En lak ista, by David Little Elk: Through Lakota Eyes and the code for this Code for En lak ista, by David Little Elk
  • 1.1 Encrypting the Internet example 1 to 111 original website


    Example 1-8         Encryption No 1         Encryption No 2        Encryption No 3         Encryption No 4         Encryption No 5       Encryption No 6         Encryption No 7         Encryption No 8
    Example 9-16       Encryption No 9         Encryption No 10      Encryption No 11        Encryption No 12       Encryption No 13     Encryption No 14       Encryption No 15       Encryption No 16
    Example 17-24     Encryption No 17       Encryption No 18       Encryption No 19       Encryption No 20       Encryption No 21     Encryption No 22       Encryption No 23       Encryption No 24
    Example 25-32     Encryption No 25       Encryption No 26       Encryption No 27       Encryption No 28       Encryption No 29     Encryption No 30       Encryption No 31       Encryption No 32
    Example 33-40     Encryption No 33       Encryption No 34       Encryption No 35       Encryption No 36       Encryption No 37     Encryption No 38       Encryption No 39       Encryption No 40
    Example 41-48     Encryption No 41       Encryption No 42       Encryption No 43       Encryption No 44       Encryption No 45     Encryption No 46       Encryption No 47       Encryption No 48
    Example 49-56     Encryption No 49       Encryption No 50       Encryption No 51       Encryption No 52       Encryption No 53     Encryption No 54       Encryption No 55       Encryption No 56
    Example 57-64     Encryption No 57       Encryption No 58       Encryption No 59       Encryption No 60       Encryption No 61     Encryption No 62       Encryption No 63       Encryption No 64
    Example 65-72     Encryption No 65       Encryption No 66       Encryption No 67       Encryption No 68       Encryption No 69     Encryption No 70       Encryption No 71       Encryption No 72
    Example 73-80     Encryption No 73       Encryption No 74       Encryption No 75       Encryption No 76       Encryption No 77     Encryption No 78       Encryption No 79       Encryption No 80
    Example 81-88     Encryption No 81       Encryption No 82       Encryption No 83       Encryption No 84       Encryption No 85     Encryption No 86       Encryption No 87       Encryption No 88
    Example 89-96     Encryption No 89       Encryption No 90       Encryption No 91       Encryption No 92       Encryption No 93     Encryption No 94       Encryption No 95       Encryption No 96
    Example 97-104   Encryption No 97       Encryption No 98       Encryption No 99       Encryption No 100     Encryption No 101    Encryption No 102     Encryption No 103     Encryption No 104
    Example 105-111 Encryption No 105     Encryption No 106     Encryption No 107     Encryption No 108     Encryption No 109     Encryption No 110     Encryption No 111    

    1.2 Leaves of Grass examples 112 to 222 original website


    Example 112-119 Encryption No 112     Encryption No 113     Encryption No 114     Encryption No 115     Encryption No 116     Encryption No 117     Encryption No 118     Encryption No 119
    Example 120-127 Encryption No 120     Encryption No 121     Encryption No 122     Encryption No 123     Encryption No 124     Encryption No 125     Encryption No 126     Encryption No 127
    Example 128-135 Encryption No 128     Encryption No 129     Encryption No 130     Encryption No 131     Encryption No 132     Encryption No 133     Encryption No 134     Encryption No 135
    Example 136-143 Encryption No 136     Encryption No 137     Encryption No 138     Encryption No 139     Encryption No 140     Encryption No 141     Encryption No 142     Encryption No 143
    Example 144-151 Encryption No 144     Encryption No 145     Encryption No 146     Encryption No 147     Encryption No 148     Encryption No 149     Encryption No 150     Encryption No 151
    Example 152-159 Encryption No 152     Encryption No 153     Encryption No 154     Encryption No 155     Encryption No 156     Encryption No 157     Encryption No 158     Encryption No 159
    Example 160-167 Encryption No 160     Encryption No 161     Encryption No 162     Encryption No 163     Encryption No 164     Encryption No 165     Encryption No 166     Encryption No 167
    Example 168-175 Encryption No 168     Encryption No 169     Encryption No 170     Encryption No 171     Encryption No 172     Encryption No 173     Encryption No 174     Encryption No 175
    Example 176-183 Encryption No 176     Encryption No 177     Encryption No 178     Encryption No 179     Encryption No 180     Encryption No 181     Encryption No 182     Encryption No 183
    Example 184-191 Encryption No 184     Encryption No 185     Encryption No 186     Encryption No 187     Encryption No 188     Encryption No 189     Encryption No 190     Encryption No 191
    Example 192-199 Encryption No 192     Encryption No 193     Encryption No 194     Encryption No 195     Encryption No 196     Encryption No 197     Encryption No 198     Encryption No 199
    Example 200-207 Encryption No 200     Encryption No 201     Encryption No 202     Encryption No 203     Encryption No 204     Encryption No 205     Encryption No 206     Encryption No 207
    Example 208-215 Encryption No 208     Encryption No 209     Encryption No 210     Encryption No 211     Encryption No 212     Encryption No 213     Encryption No 214     Encryption No 215
    Example 216-222 Encryption No 216     Encryption No 217     Encryption No 218     Encryption No 219     Encryption No 220     Encryption No 221     Encryption No 222    

    1.3 Cicero In Pisonem Examples 223 to 333 original website


    Example 223-230 Encryption No 223     Encryption No 224     Encryption No 225     Encryption No 226     Encryption No 227     Encryption No 228     Encryption No 229     Encryption No 230
    Example 231-238 Encryption No 231     Encryption No 232     Encryption No 233     Encryption No 234     Encryption No 235     Encryption No 236     Encryption No 237     Encryption No 238
    Example 239-246 Encryption No 239     Encryption No 240     Encryption No 241     Encryption No 242     Encryption No 243     Encryption No 244     Encryption No 245     Encryption No 246
    Example 247-254 Encryption No 247     Encryption No 248     Encryption No 249     Encryption No 250     Encryption No 251     Encryption No 252     Encryption No 253     Encryption No 254
    Example 255-262 Encryption No 255     Encryption No 256     Encryption No 257     Encryption No 258     Encryption No 259     Encryption No 260     Encryption No 261     Encryption No 262
    Example 263-270 Encryption No 263     Encryption No 264     Encryption No 265     Encryption No 266     Encryption No 267     Encryption No 268     Encryption No 269     Encryption No 270
    Example 271-278 Encryption No 271     Encryption No 272     Encryption No 273     Encryption No 274     Encryption No 275     Encryption No 276     Encryption No 277     Encryption No 278
    Example 279-286 Encryption No 279     Encryption No 280     Encryption No 281     Encryption No 282     Encryption No 283     Encryption No 284     Encryption No 285     Encryption No 286
    Example 287-294 Encryption No 287     Encryption No 288     Encryption No 289     Encryption No 290     Encryption No 291     Encryption No 292     Encryption No 293     Encryption No 294
    Example 295-302 Encryption No 295     Encryption No 296     Encryption No 297     Encryption No 298     Encryption No 299     Encryption No 300     Encryption No 301     Encryption No 302
    Example 303-310 Encryption No 303     Encryption No 304     Encryption No 305     Encryption No 306     Encryption No 307     Encryption No 308     Encryption No 309     Encryption No 310
    Example 311-318 Encryption No 311     Encryption No 312     Encryption No 313     Encryption No 314     Encryption No 315     Encryption No 316     Encryption No 317     Encryption No 318
    Example 319-326 Encryption No 319     Encryption No 320     Encryption No 321     Encryption No 322     Encryption No 323     Encryption No 324     Encryption No 325     Encryption No 326
    Example 327-333 Encryption No 327     Encryption No 328     Encryption No 329     Encryption No 330     Encryption No 331     Encryption No 332     Encryption No 333    

    1.4 The Gutenberg Bible [produced approx 1454 one of 49 of the original 180 produced] 334 to 444 original website


    Example 334-341 Encryption No 334     Encryption No 335     Encryption No 336     Encryption No 337     Encryption No 338     Encryption No 339     Encryption No 340     Encryption No 341
    Example 342-349 Encryption No 342     Encryption No 343     Encryption No 344     Encryption No 345     Encryption No 346     Encryption No 347     Encryption No 348     Encryption No 349
    Example 350-357 Encryption No 350     Encryption No 351     Encryption No 352     Encryption No 353     Encryption No 354     Encryption No 355     Encryption No 356     Encryption No 357
    Example 358-365 Encryption No 358     Encryption No 359     Encryption No 360     Encryption No 361     Encryption No 362     Encryption No 363     Encryption No 364     Encryption No 365
    Example 366-373 Encryption No 366     Encryption No 367     Encryption No 368     Encryption No 369     Encryption No 370     Encryption No 371     Encryption No 372     Encryption No 373
    Example 374-381 Encryption No 374     Encryption No 375     Encryption No 376     Encryption No 377     Encryption No 378     Encryption No 379     Encryption No 380     Encryption No 381
    Example 382-389 Encryption No 382     Encryption No 383     Encryption No 384     Encryption No 385     Encryption No 386     Encryption No 387     Encryption No 388     Encryption No 389
    Example 390-397 Encryption No 390     Encryption No 391     Encryption No 392     Encryption No 393     Encryption No 394     Encryption No 395     Encryption No 396     Encryption No 397
    Example 398-405 Encryption No 398     Encryption No 399     Encryption No 400     Encryption No 401     Encryption No 402     Encryption No 403     Encryption No 404     Encryption No 405
    Example 406-413 Encryption No 406     Encryption No 407     Encryption No 408     Encryption No 409     Encryption No 410     Encryption No 411     Encryption No 412     Encryption No 413
    Example 414-421 Encryption No 414     Encryption No 415     Encryption No 416     Encryption No 417     Encryption No 418     Encryption No 419     Encryption No 420     Encryption No 421
    Example 422-429 Encryption No 422     Encryption No 423     Encryption No 424     Encryption No 425     Encryption No 426     Encryption No 427     Encryption No 428     Encryption No 429
    Example 430-437 Encryption No 430     Encryption No 431     Encryption No 432     Encryption No 433     Encryption No 434     Encryption No 435     Encryption No 436     Encryption No 437
    Example 438-444 Encryption No 438     Encryption No 439     Encryption No 440     Encryption No 441     Encryption No 442     Encryption No 443     Encryption No 444    

    1.5 Taoism ~ How Huineng Became the Sixth Patriarch 445 to 555 original website


    Example 445-452 Encryption No 445     Encryption No 446     Encryption No 447     Encryption No 448     Encryption No 449     Encryption No 450     Encryption No 451     Encryption No 452
    Example 453-460 Encryption No 453     Encryption No 454     Encryption No 455     Encryption No 456     Encryption No 457     Encryption No 458     Encryption No 459     Encryption No 460
    Example 461-468 Encryption No 461     Encryption No 462     Encryption No 463     Encryption No 464     Encryption No 465     Encryption No 466     Encryption No 467     Encryption No 468
    Example 469-476 Encryption No 469     Encryption No 470     Encryption No 471     Encryption No 472     Encryption No 473     Encryption No 474     Encryption No 475     Encryption No 476
    Example 477-484 Encryption No 477     Encryption No 478     Encryption No 479     Encryption No 480     Encryption No 481     Encryption No 482     Encryption No 483     Encryption No 484
    Example 485-492 Encryption No 485     Encryption No 486     Encryption No 487     Encryption No 488     Encryption No 489     Encryption No 490     Encryption No 491     Encryption No 492
    Example 493-500 Encryption No 493     Encryption No 494     Encryption No 495     Encryption No 496     Encryption No 497     Encryption No 498     Encryption No 499     Encryption No 500
    Example 501-508 Encryption No 501     Encryption No 502     Encryption No 503     Encryption No 504     Encryption No 505     Encryption No 506     Encryption No 507     Encryption No 508
    Example 509-516 Encryption No 509     Encryption No 510     Encryption No 511     Encryption No 512     Encryption No 513     Encryption No 514     Encryption No 515     Encryption No 516
    Example 517-524 Encryption No 517     Encryption No 518     Encryption No 519     Encryption No 520     Encryption No 521     Encryption No 522     Encryption No 523     Encryption No 524
    Example 525-532 Encryption No 525     Encryption No 526     Encryption No 527     Encryption No 528     Encryption No 529     Encryption No 530     Encryption No 531     Encryption No 532
    Example 533-540 Encryption No 533     Encryption No 534     Encryption No 535     Encryption No 536     Encryption No 537     Encryption No 538     Encryption No 539     Encryption No 540
    Example 541-548 Encryption No 541     Encryption No 542     Encryption No 543     Encryption No 544     Encryption No 545     Encryption No 546     Encryption No 547     Encryption No 548
    Example 549-555 Encryption No 549     Encryption No 550     Encryption No 551     Encryption No 552     Encryption No 553     Encryption No 554     Encryption No 555    

    1.6 Publius Vergilius Maro (October 15, 70 BC - September 21, 19 BC) examples 556 to 666 original website


    Example 556-563 Encryption No 556     Encryption No 557     Encryption No 558     Encryption No 559     Encryption No 560     Encryption No 561     Encryption No 562     Encryption No 563
    Example 564-571 Encryption No 564     Encryption No 565     Encryption No 566     Encryption No 567     Encryption No 568     Encryption No 569     Encryption No 570     Encryption No 571
    Example 572-579 Encryption No 572     Encryption No 573     Encryption No 574     Encryption No 575     Encryption No 576     Encryption No 577     Encryption No 578     Encryption No 579
    Example 580-587 Encryption No 580     Encryption No 581     Encryption No 582     Encryption No 583     Encryption No 584     Encryption No 585     Encryption No 586     Encryption No 587
    Example 588-595 Encryption No 588     Encryption No 589     Encryption No 590     Encryption No 591     Encryption No 592     Encryption No 593     Encryption No 594     Encryption No 595
    Example 596-603 Encryption No 596     Encryption No 597     Encryption No 598     Encryption No 599     Encryption No 600     Encryption No 601     Encryption No 602     Encryption No 603
    Example 604-611 Encryption No 604     Encryption No 605     Encryption No 606     Encryption No 607     Encryption No 608     Encryption No 609     Encryption No 610     Encryption No 611
    Example 612-619 Encryption No 612     Encryption No 613     Encryption No 614     Encryption No 615     Encryption No 616     Encryption No 617     Encryption No 618     Encryption No 619
    Example 620-627 Encryption No 620     Encryption No 621     Encryption No 622     Encryption No 623     Encryption No 624     Encryption No 625     Encryption No 626     Encryption No 627
    Example 628-635 Encryption No 628     Encryption No 629     Encryption No 630     Encryption No 631     Encryption No 632     Encryption No 633     Encryption No 634     Encryption No 635
    Example 636-643 Encryption No 636     Encryption No 637     Encryption No 638     Encryption No 639     Encryption No 640     Encryption No 641     Encryption No 642     Encryption No 643
    Example 644-651 Encryption No 644     Encryption No 645     Encryption No 646     Encryption No 647     Encryption No 648     Encryption No 649     Encryption No 650     Encryption No 651
    Example 652-659 Encryption No 652     Encryption No 653     Encryption No 654     Encryption No 655     Encryption No 656     Encryption No 657     Encryption No 658     Encryption No 659
    Example 660-666 Encryption No 660     Encryption No 661     Encryption No 662     Encryption No 663     Encryption No 664     Encryption No 665     Encryption No 666    

    1.7 Marie Claude Bäy, photographer examples 667 to 777 original website


    Example 667-674 Encryption No 667     Encryption No 668     Encryption No 669     Encryption No 670     Encryption No 671     Encryption No 672     Encryption No 673     Encryption No 674
    Example 675-682 Encryption No 675     Encryption No 676     Encryption No 677     Encryption No 678     Encryption No 679     Encryption No 680     Encryption No 681     Encryption No 682
    Example 683-690 Encryption No 683     Encryption No 684     Encryption No 685     Encryption No 686     Encryption No 687     Encryption No 688     Encryption No 689     Encryption No 690
    Example 691-698 Encryption No 691     Encryption No 692     Encryption No 693     Encryption No 694     Encryption No 695     Encryption No 696     Encryption No 697     Encryption No 698
    Example 699-706 Encryption No 699     Encryption No 700     Encryption No 701     Encryption No 702     Encryption No 703     Encryption No 704     Encryption No 705     Encryption No 706
    Example 707-714 Encryption No 707     Encryption No 708     Encryption No 709     Encryption No 710     Encryption No 711     Encryption No 712     Encryption No 713     Encryption No 714
    Example 715-722 Encryption No 715     Encryption No 716     Encryption No 717     Encryption No 718     Encryption No 719     Encryption No 720     Encryption No 721     Encryption No 722
    Example 723-730 Encryption No 723     Encryption No 724     Encryption No 725     Encryption No 726     Encryption No 727     Encryption No 728     Encryption No 729     Encryption No 730
    Example 731-738 Encryption No 731     Encryption No 732     Encryption No 733     Encryption No 734     Encryption No 735     Encryption No 736     Encryption No 737     Encryption No 738
    Example 739-746 Encryption No 739     Encryption No 740     Encryption No 741     Encryption No 742     Encryption No 743     Encryption No 744     Encryption No 745     Encryption No 746
    Example 747-754 Encryption No 747     Encryption No 748     Encryption No 749     Encryption No 750     Encryption No 751     Encryption No 752     Encryption No 753     Encryption No 754
    Example 755-762 Encryption No 755     Encryption No 756     Encryption No 757     Encryption No 758     Encryption No 759     Encryption No 760     Encryption No 761     Encryption No 762
    Example 763-770 Encryption No 763     Encryption No 764     Encryption No 765     Encryption No 766     Encryption No 767     Encryption No 768     Encryption No 769     Encryption No 770
    Example 771-777 Encryption No 771     Encryption No 772     Encryption No 773     Encryption No 774     Encryption No 775     Encryption No 776     Encryption No 777    

    1.8 Jean-Bernard Couzinet,artist examples 778 to 888 original website


    Example 778-785 Encryption No 778     Encryption No 779     Encryption No 780     Encryption No 781     Encryption No 782     Encryption No 783     Encryption No 784     Encryption No 785
    Example 786-793 Encryption No 786     Encryption No 787     Encryption No 788     Encryption No 789     Encryption No 790     Encryption No 791     Encryption No 792     Encryption No 793
    Example 794-801 Encryption No 794     Encryption No 795     Encryption No 796     Encryption No 797     Encryption No 798     Encryption No 799     Encryption No 800     Encryption No 801
    Example 802-809 Encryption No 802     Encryption No 803     Encryption No 804     Encryption No 805     Encryption No 806     Encryption No 807     Encryption No 808     Encryption No 809
    Example 810-817 Encryption No 810     Encryption No 811     Encryption No 812     Encryption No 813     Encryption No 814     Encryption No 815     Encryption No 816     Encryption No 817
    Example 818-825 Encryption No 818     Encryption No 819     Encryption No 820     Encryption No 821     Encryption No 822     Encryption No 823     Encryption No 824     Encryption No 825
    Example 826-833 Encryption No 826     Encryption No 827     Encryption No 828     Encryption No 829     Encryption No 830     Encryption No 831     Encryption No 832     Encryption No 833
    Example 834-841 Encryption No 834     Encryption No 835     Encryption No 836     Encryption No 837     Encryption No 838     Encryption No 839     Encryption No 840     Encryption No 841
    Example 842-849 Encryption No 842     Encryption No 843     Encryption No 844     Encryption No 845     Encryption No 846     Encryption No 847     Encryption No 848     Encryption No 849
    Example 850-857 Encryption No 850     Encryption No 851     Encryption No 852     Encryption No 853     Encryption No 854     Encryption No 855     Encryption No 856     Encryption No 857
    Example 858-865 Encryption No 858     Encryption No 859     Encryption No 860     Encryption No 861     Encryption No 862     Encryption No 863     Encryption No 864     Encryption No 865
    Example 866-873 Encryption No 866     Encryption No 867     Encryption No 868     Encryption No 869     Encryption No 870     Encryption No 871     Encryption No 872     Encryption No 873
    Example 874-881 Encryption No 874     Encryption No 875     Encryption No 876     Encryption No 877     Encryption No 878     Encryption No 879     Encryption No 880     Encryption No 881
    Example 882-888 Encryption No 882     Encryption No 883     Encryption No 884     Encryption No 885     Encryption No 886     Encryption No 887     Encryption No 888    

    1.9 En lak ista, by David Little Elk examples 889 to 1000 original website


    Example 889-896 Encryption No 889     Encryption No 890     Encryption No 891     Encryption No 892     Encryption No 893     Encryption No 894     Encryption No 895     Encryption No 896
    Example 897-904 Encryption No 897     Encryption No 898     Encryption No 899     Encryption No 900     Encryption No 901     Encryption No 902     Encryption No 903     Encryption No 904
    Example 905-912 Encryption No 905     Encryption No 906     Encryption No 907     Encryption No 908     Encryption No 909     Encryption No 910     Encryption No 911     Encryption No 912
    Example 913-920 Encryption No 913     Encryption No 914     Encryption No 915     Encryption No 916     Encryption No 917     Encryption No 918     Encryption No 919     Encryption No 920
    Example 921-928 Encryption No 921     Encryption No 922     Encryption No 923     Encryption No 924     Encryption No 925     Encryption No 926     Encryption No 927     Encryption No 928
    Example 929-936 Encryption No 929     Encryption No 930     Encryption No 931     Encryption No 932     Encryption No 933     Encryption No 934     Encryption No 935     Encryption No 936
    Example 937-944 Encryption No 937     Encryption No 938     Encryption No 939     Encryption No 940     Encryption No 941     Encryption No 942     Encryption No 943     Encryption No 944
    Example 945-952 Encryption No 945     Encryption No 946     Encryption No 947     Encryption No 948     Encryption No 949     Encryption No 950     Encryption No 951     Encryption No 952
    Example 953-960 Encryption No 953     Encryption No 954     Encryption No 955     Encryption No 956     Encryption No 957     Encryption No 958     Encryption No 959     Encryption No 960
    Example 961-968 Encryption No 961     Encryption No 962     Encryption No 963     Encryption No 964     Encryption No 965     Encryption No 966     Encryption No 967     Encryption No 968
    Example 969-976 Encryption No 969     Encryption No 970     Encryption No 971     Encryption No 972     Encryption No 973     Encryption No 974     Encryption No 975     Encryption No 976
    Example 977-984 Encryption No 977     Encryption No 978     Encryption No 979     Encryption No 980     Encryption No 981     Encryption No 982     Encryption No 983     Encryption No 984
    Example 985-992 Encryption No 985     Encryption No 986     Encryption No 987     Encryption No 988     Encryption No 989     Encryption No 990     Encryption No 991     Encryption No 992
    Example993-1000 Encryption No 993    Encryption No 994     Encryption No 995     Encryption No 996     Encryption No 997     Encryption No 998     Encryption No 999     Encryption No 1000