This diagram shows the information from Table 1 in visual form. It shows an upside down T-shaped funnel, where the ciphertext is inputted at one end of the T. The key and cipher are combined and fed into the funnel from above, meeting the ciphertext in the middle of the T. The encrypted text is then seen coming out of the other end.