If you really want to know how to encrypt large data like an audio clip, get the book called Applied Cryptography 20th Anniversary Edition.
In the book, it gives an example how to break up the message (the data converted to an integer) into tiny pieces (3 digits each) and encrypt the lot of them. Of course, larger pieces can be used so long as each piece is less than p*q, where p and q are large prime numbers.
Posted by sjhalayka
on 23 December 2015 - 08:44 AM
Networks are sometimes modeled by graph theory. One of the next steps is to put in a hopping entity that travels through the network (graph).
About those last 4 images:
Since the pointing outward value for all 4 solutions doesn't ever get to 0.5 and beyond (red lines don't ever become as prevalent as blue lines), the black hole's exterior network produces attraction via spatial curvature.
The average dot product value shows that the blue and red lines are almost always pointing nearly orthogonal to the corresponding outward pointing normals (not shown)... like there are layers of rotation.
The red lines along the black hole surface should actually be pointing inward when the black hole interior is modelled by a complete network (not shown). Ignore those red lines, they should be blue.