Arnold Transformations As Applied To Data Encryption