Living in the global surveillance era, any internet user should himself organize the secrecy of his communication. Therefore, in the submission, it is shown how to use the base conversion as an effective cryptographic transformation because the statistical structure of the encoded file is quite different from that of the input file.
Czeslaw Koscielny