Three variations of a method of representing (abstract) state machines as
polynomial mappings, and three variations of a corresponding encryption
program stored on a computer readable medium. The encryption program is
based directly on symbolic functional composition of polynomial mappings
with permutations expressed as polynomial mappings.