Modeling an unconventional encryption algorithm