33 transposition technique to encrypt the following message using the key Decrypt. Ignore the comma and
There are two parts to this assignment. Part 1 involves the encryption/decryption scenario below and Part 2 requires research on the classification of ciphers, and popular algorithms. Use a two-stage…