security in computing chapter 2 elementary cryptography