Figure 1:
Blowfish Encryption.