6.2.3 Cipher and Reverse Cipher