"FIG. 4 is a flow chart showing the encrypting operation of the encrypting apparatus in the second embodiment." . . . .