The following is an extract of a poem. This is the text we will be using as our example input for encrypting with a password.
Twisted and gnarled, these roots run deep into realms that open whilst I sleep;
designing a counterfeit system composed of intricately versed poem.
Next, we have the password in which we shall encrypt everything with.