Intrinsic Information Security by O. Tettero