as we encrypt every bit separately we need to loop through the number of bits; thanks to Michael McDougall <mmcdouga@saul.cis.upenn.edu> PR: 1318